You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Deployment.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -312,7 +312,7 @@ Build and Deployment:
312
312
comments: ""
313
313
Evaluation of the trust of used components:
314
314
risk:
315
-
Application and system components like Open Source libraies or images can have implementation flaws or deployment flaws.
315
+
Application and system components like Open Source libraries or images can have implementation flaws or deployment flaws.
316
316
Developers or operations might start random images in the production cluster which have malicious code or known vulnerabilities.
317
317
measure:
318
318
Each components source is evaluated to be trusted. For example the source, number of developers included, email configuration used by maintainers to prevent maintainer account theft, typo-squatting, ...
Copy file name to clipboardExpand all lines: src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Culture and Organization:
28
28
evidence: ""
29
29
comments: ""
30
30
Security Coaching:
31
-
risk: Training does not change behaviour. Therefore, even if security practices are understood, it's likly that they are not performed.
31
+
risk: Training does not change behaviour. Therefore, even if security practices are understood, it's likely that they are not performed.
32
32
measure: By coaching teams on security topics using for example the samman coaching method, teams internalize security practices as new habits in their development process.
33
33
difficultyOfImplementation:
34
34
knowledge: 4
@@ -314,7 +314,7 @@ Culture and Organization:
314
314
risk: Employees are not getting excited about security.
315
315
measure: Good communication and transparency encourages cross-organizational
316
316
support. Gamification of security is also known to help, examples include
317
-
T-Shirts, mugs, cups, giftcards and 'High-Fives'.
317
+
T-Shirts, mugs, cups, gift cards and 'High-Fives'.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/Implementation/ApplicationHardening.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ Implementation:
68
68
dependsOn:
69
69
- App. Hardening Level 1 (50%)
70
70
description: |
71
-
To tackle the security of code developed in-house, OWASP offers an extensive collection of [Cheatsheets](https://cheatsheetseries.owasp.org/) demonstrating how to implement features securely. Moreover, the Security Knowledge Framework[1] offers an extensive library of code patterns spanning several programming languages. These patterns can be used to not only jumpstart the development process, but also do so securely.
71
+
To tackle the security of code developed in-house, OWASP offers an extensive collection of [Cheatsheets](https://cheatsheetseries.owasp.org/) demonstrating how to implement features securely. Moreover, the Security Knowledge Framework[1] offers an extensive library of code patterns spanning several programming languages. These patterns can be used to not only jump-start the development process, but also do so securely.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/Consolidation.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ Test and Verification:
59
59
- 5.10
60
60
isImplemented: false
61
61
evidence: ""
62
-
comments: "The [DefectDojo-Client](https://github.com/SDA-SE/defectdojo-client/tree/master/statistic-client) generates statistics from OWASP DefectDojo and places the results in a [github repository](https://github.com/pagel-pro/cluster-image-scanner-all-results)."
62
+
comments: "The [DefectDojo-Client](https://github.com/SDA-SE/defectdojo-client/tree/master/statistic-client) generates statistics from OWASP DefectDojo and places the results in a [Github repository](https://github.com/pagel-pro/cluster-image-scanner-all-results)."
63
63
Generation of Patch Management Statistics:
64
64
risk: Delays in patch response lead to an increased attack surface through longer exposure of known vulnerabilities.
65
65
measure: Average time to patch is visualized per component/project/team.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/StaticDepthForInfrastructure.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ Test and Verification:
56
56
resources: 1
57
57
usefulness: 4
58
58
level: 4
59
-
description: Subscribing to github projects and reading release notes might help. Software Composition Analysis for infrastructe might help, but is often too fine-granular.
59
+
description: Subscribing to Github projects and reading release notes might help. Software Composition Analysis for infrastructure might help, but is often too fine-granular.
0 commit comments