Skip to content

Commit 9dd70c3

Browse files
committed
Review Test & Verification, level 1
1 parent 653ea74 commit 9dd70c3

2 files changed

Lines changed: 35 additions & 12 deletions

File tree

src/assets/YAML/default/TestAndVerification/Consolidation.yaml

Lines changed: 30 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,17 @@ Test and Verification:
139139
comments: ""
140140
Simple false positive treatment:
141141
uuid: c1acc8af-312e-4503-a817-a26220c993a0
142-
risk:
143-
As false positive occur during each test, all vulnerabilities might be
144-
ignored. Specially, if tests are automated an run daily.
145-
measure: |-
142+
description: |
143+
Security tests may produce false positives—findings that are incorrectly identified as vulnerabilities.
144+
145+
It is important distinguish these from true vulnerabilities to avoid wasting time and resources on non-issues.
146+
147+
False positive treatment ensures that findings from security tests are triaged and documented, allowing teams to distinguish between real vulnerabilities and false positives. This reduces unnecessary work and helps maintain focus on true risks.
148+
149+
Some positive findings might be considered an accepted risk by the organization. This must also be documented.
150+
risk: |
151+
If false positives are not managed, teams may ignore all findings, leading to real vulnerabilities being overlooked and increasing the risk of exploitation. Specially, if tests are automated an run daily.
152+
measure: |
146153
Findings from security tests must be triaged and outcomes persisted/documented to:
147154
- Prevent re-analysis of known issues in subsequent test runs
148155
- Track accepted risks vs false positives
@@ -154,12 +161,14 @@ Test and Verification:
154161
- [OWASP Dependency Check](https://jeremylong.github.io/DependencyCheck/general/suppression.html)
155162
- [Kubescape with VEX](https://kubescape.io/blog/2023/12/07/kubescape-support-for-vex-generation/)
156163
- [OWASP DefectDojo Risk Acceptance](https://docs.defectdojo.com/en/working_with_findings/findings_workflows/risk_acceptances/) and [False Positive Handling](https://docs.defectdojo.com/en/working_with_findings/intro_to_findings/#triage-vulnerabilities-using-finding-status)
164+
assessment: |
165+
The organization has a process for triaging and documenting false positives and accepted risks
166+
level: 1
157167
difficultyOfImplementation:
158168
knowledge: 1
159169
time: 1
160170
resources: 1
161171
usefulness: 4
162-
level: 1
163172
implementation:
164173
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-defectdojo
165174
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/purify
@@ -274,17 +283,23 @@ Test and Verification:
274283
comments: ""
275284
Treatment of defects with severity high or higher:
276285
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
277-
risk: Vulnerabilities with severity high or higher are not visible.
278-
measure:
279-
Vulnerabilities with severity high or higher are added to the quality
280-
gate.
286+
description: |
287+
All security problems that are rated as "high" or "critical" must be fixed before the software can be released or used in production. This means that if a serious vulnerability is found, it cannot be ignored or postponed.
288+
risk: |
289+
If serious security problems are not fixed, attackers could exploit them to steal data, disrupt services, or cause other harm. Ignoring these issues puts the organization, its customers, and its reputation at risk.
290+
measure: |
291+
- Make it a rule that all high or critical security findings must be fixed before the software is approved for release or use.
292+
- Track these issues and make sure they are resolved quickly.
293+
- Pay extra attention to Known Exploited Vulnerabilities (KEV) from CISA and EPSS scores when prioritizing fixes.
294+
assessment: |
295+
There is clear evidence that all high or critical security issues are tracked and fixed before release. No high or critical issues remain open in production systems.
296+
comments: False positive analysis, specially for static analysis, is time consuming.
297+
level: 1
281298
difficultyOfImplementation:
282299
knowledge: 2
283300
time: 2
284301
resources: 1
285302
usefulness: 4
286-
level: 1
287-
comments: False positive analysis, specially for static analysis, is time consuming.
288303
references:
289304
samm2:
290305
- I-DM-2-B
@@ -294,7 +309,10 @@ Test and Verification:
294309
iso27001-2022:
295310
- 8.8
296311
- 5.25
297-
implementation: []
312+
implementation:
313+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/cisa-kev
314+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/trivy
315+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/grype
298316
tags: ["vuln-action", "defect-management"]
299317
evidence: ""
300318
Treatment of defects with severity middle:

src/assets/YAML/default/implementations.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -710,6 +710,11 @@ implementations:
710710
name: https://github.com/aquasecurity/trivy
711711
tags: []
712712
url: https://github.com/aquasecurity/trivy
713+
grype:
714+
uuid: 7f500e95-2110-44c4-a1f8-cd7ef5d9eb6b
715+
name: Grype
716+
tags: [sbom, dependency, vulnerability]
717+
url: https://github.com/anchore/grype
713718
registries-like-quay:
714719
uuid: 8737c6c0-4e90-400a-bf9a-f8e399913b57
715720
name: Registries like quay

0 commit comments

Comments
 (0)