Skip to content

Commit 2526d1c

Browse files
authored
Merge pull request #74 from MagnificRogue/magnificrogue/aspell-check
Manually run Aspell Check
2 parents 2c68c66 + ad6b318 commit 2526d1c

11 files changed

Lines changed: 53 additions & 53 deletions

File tree

data-new/BuildAndDeployment/Sub-Dimensions.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ Build:
2222
measure: Each step during within the build and testing phase is performed in
2323
a separate virtual environments, which is destroyed afterward.
2424
meta:
25-
implementationGuide: Depending on your envirnoment, usage of virtual machines
26-
or container technoligy is a good way. After the build, the filesystem should
25+
implementationGuide: Depending on your environment, usage of virtual machines
26+
or container technology is a good way. After the build, the filesystem should
2727
not be used again in other builds.
2828
difficultyOfImplementation:
2929
knowledge: 2
@@ -278,7 +278,7 @@ Deployment:
278278
- 12.1.4
279279
Usage of trusted images:
280280
risk: Developers or operations might start random images in the production cluster
281-
which have malicous code or known vulnerabilities.
281+
which have malicious code or known vulnerabilities.
282282
measure: Create image assessment criteria, perform an evaluation of images and
283283
create a whitelist of artifacts/container images/virtual machine images.
284284
implementation: Kubernetes Admission Controller can whitelist registries and/or
@@ -300,7 +300,7 @@ Deployment:
300300
to be known where an artifacts with that vulnerability is deployed with which
301301
dependencies.
302302
measure: A documented inventory or a possibility to gather the needed information
303-
(e.g. the documentation of which script needs to be run by whoom) must be
303+
(e.g. the documentation of which script needs to be run by whom) must be
304304
in place.
305305
dependsOn:
306306
- Defined deployment process
@@ -347,7 +347,7 @@ Patch Management:
347347
risk: Known vulnerabilities components might stay for long and get exploited,
348348
even when a patch is available.
349349
measure: Fast patching of third party component is needed. The DevOps way is
350-
to have an automated pull request for new components. This includes <ul> <li>Applications</li><li>Virutalized
350+
to have an automated pull request for new components. This includes <ul> <li>Applications</li><li>Virtualized
351351
operating system components (e.g. container images)</li> <li>Operating Systems</li><li>Infrastructure
352352
as Code/GitOps (e.g. argocd)</li> </ul>
353353
difficultyOfImplementation:

data-new/CultureAndOrganization/Design.yaml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
Design:
3-
Conduction of advanced threat modelling:
3+
Conduction of advanced threat modeling:
44
risk: Inadequate identification of business and technical risks.
5-
measure: Threat modelling is performed by using reviewing user stories and producing
5+
measure: Threat modeling is performed by using reviewing user stories and producing
66
security driven data flow diagrams.
77
difficultyOfImplementation:
88
knowledge: 4
@@ -29,10 +29,10 @@ Design:
2929
- may be part of risk assessment
3030
- 8.2.1
3131
- 14.2.1
32-
Conduction of simple threat modelling on business level:
32+
Conduction of simple threat modeling on business level:
3333
risk: Business related threats are discovered too late in the development and
3434
deployment process.
35-
measure: Threat modelling of business functionality is performed during the product
35+
measure: Threat modeling of business functionality is performed during the product
3636
backlog creation to facilitate early detection of security defects.
3737
difficultyOfImplementation:
3838
knowledge: 2
@@ -46,10 +46,10 @@ Design:
4646
- may be part of risk assessment
4747
- 8.2.1
4848
- 14.2.1
49-
Conduction of simple threat modelling on technical level:
49+
Conduction of simple threat modeling on technical level:
5050
risk: Technical related threats are discovered too late in the development and
5151
deployment process.
52-
measure: Threat modelling of technical features is performed during the product
52+
measure: Threat modeling of technical features is performed during the product
5353
sprint planning.
5454
difficultyOfImplementation:
5555
knowledge: 2
@@ -58,7 +58,7 @@ Design:
5858
usefulness: 3
5959
level: 1
6060
implementation:
61-
- <a href="https://github.com/Toreon/threat-model-playbook">Threat modelling Playbook</a>
61+
- <a href="https://github.com/Toreon/threat-model-playbook">Threat modeling Playbook</a>
6262
md-description: |2
6363
6464
Once requirements are gathered and analysis is performed, implementation specifics need to be defined. The outcome of this stage is usually a diagram outlining data flows and a general system architecture. This presents an opportunity for both threat modeling and attaching security considerations to every ticket and epic that is the outcome of this stage.
@@ -75,7 +75,7 @@ Design:
7575
7676
![Threat Model](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/threat_model.png "Threat Model")
7777
78-
Last, if the organisation maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
78+
Last, if the organizations maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
7979
8080
![SKF](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/skf_qs.png "SKF")
8181
@@ -104,7 +104,7 @@ Design:
104104
risk: Simple user stories are not going deep enough. Relevant security considerations
105105
are performed. Security flaws are discovered too late in the development and
106106
deployment process
107-
measure: Advanced abuse stories are created as part of threat modelling activities.
107+
measure: Advanced abuse stories are created as part of threat modeling activities.
108108
difficultyOfImplementation:
109109
knowledge: 4
110110
time: 2
@@ -118,7 +118,7 @@ Design:
118118
- not explicitly covered by ISO 27001
119119
- may be part of project management
120120
- 6.1.5
121-
- may be part of risk assesment
121+
- may be part of risk assessment
122122
- 8.1.2
123123
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
124124
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
@@ -138,13 +138,13 @@ Design:
138138
- not explicitly covered by ISO 27001
139139
- may be part of project management
140140
- 6.1.5
141-
- may be part of risk assesment
141+
- may be part of risk assessment
142142
- 8.1.2
143143
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
144144
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
145145
Security Stories and Security Tasks for Agile Development Environments</a>
146146
Information security targets are communicated:
147-
risk: Employees don't known their organisation security targets. Therefore security
147+
risk: Employees don't known their organizations security targets. Therefore security
148148
is not considered during development and administration as much as it should
149149
be.
150150
measure: Transparent and timely communication of the security targets by senior

data-new/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Education and Guidance:
8383
samm: EG2-B
8484
iso27001-2017:
8585
- 7.2.2
86-
implementation: Often, external employees are not invited for interal trainings.
86+
implementation: Often, external employees are not invited for internal trainings.
8787
This activity focuses on providing security trainings to internal as well as
8888
external employees. It is conducted every two weeks for around one hour.
8989
Each team has a security champion:
@@ -138,7 +138,7 @@ Education and Guidance:
138138
- 12.7.1
139139
Conduction of collaborative team security checks:
140140
risk: Development teams limited insight over security practices.
141-
measure: Mutual security testing the security of other teams's project enhances
141+
measure: Mutual security testing the security of other teams project enhances
142142
security awareness and knowledge.
143143
difficultyOfImplementation:
144144
resources: 2
@@ -148,7 +148,7 @@ Education and Guidance:
148148
level: 4
149149
samm: EG2-A
150150
iso27001-2017:
151-
- Mutual scurity testing is not explicitly required in ISO 27001 may be
151+
- Mutual security testing is not explicitly required in ISO 27001 may be
152152
- 7.2.2
153153
Conduction of build-it, break-it, fix-it contests:
154154
risk: Understanding security is hard, even for security champions and the conduction
@@ -184,7 +184,7 @@ Education and Guidance:
184184
- 16.1.5
185185
Reward of good communication:
186186
risk: Employees are not getting excited about security.
187-
measure: Good communication and transparency encourages cross-organisational support.
187+
measure: Good communication and transparency encourages cross-organizational support.
188188
Gamification of security is also known to help, examples include T-Shirts, mugs,
189189
cups, giftcards and 'High-Fives'.
190190
difficultyOfImplementation:

data-new/Implementation/ApplicationHardening.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ Application Hardening:
2727
2828
![SAMM Requirements](https://github.com/OWASP/www-project-integration-standards/raw/master/writeups/owasp_in_sdlc/images/OWASP-in0.png)
2929
30-
Organisations can use these to add solid security considerations at the start of the Software Development or Procurement process.
30+
Organizations can use these to add solid security considerations at the start of the Software Development or Procurement process.
3131
3232
These general security considerations can be audited by using a subsection of the ASVS controls in section V1 as a questionnaire. This process attempts to ensure that every feature has concrete security considerations.
3333
34-
In case of internal development and if the organisation maps Features to Epics, the [Security Knowledge Framework](https://securityknowledgeframework.org/) can be used to facilitate this process by leveraging its questionnaire function, shown below.
34+
In case of internal development and if the organization maps Features to Epics, the [Security Knowledge Framework](https://securityknowledgeframework.org/) can be used to facilitate this process by leveraging its questionnaire function, shown below.
3535
3636
Source: [OWASP Project Integration](https://raw.githubusercontent.com/OWASP/www-project-integration-standards/master/writeups/owasp_in_sdlc/index.md)
3737
implementation:

data-new/Implementation/InfrastructureHardening.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Infrastructure Hardening:
44
risk: Using default configurations for a cluster environment leads to potential
55
risks.
66
measure: Harden cluster environments according to best practices. Level 1 and
7-
partiually level 2 from hardening practices like 'CIS Kubernetes Bench for Security'
7+
partially level 2 from hardening practices like 'CIS Kubernetes Bench for Security'
88
should considered.
99
difficultyOfImplementation:
1010
knowledge: 4
@@ -75,8 +75,8 @@ Infrastructure Hardening:
7575
- 13.1.3
7676
Filter outgoing traffic:
7777
risk: A compromised infrastructure component might try to send out stolen data.
78-
measure: Having a whitelist and explizitly allowing egress traffic provides the
79-
ability to stop unauthorized data leackage.
78+
measure: Having a whitelist and explicitly allowing egress traffic provides the
79+
ability to stop unauthorized data leakage.
8080
difficultyOfImplementation:
8181
knowledge: 3
8282
time: 3
@@ -123,7 +123,7 @@ Infrastructure Hardening:
123123
implementation: seccomp, strace
124124
samm2: o-environment-management|A|1
125125
iso27001-2017:
126-
- system hardenong is not explicitly covered by ISO 27001 - too specific
126+
- system hardening is not explicitly covered by ISO 27001 - too specific
127127
Immutable Infrastructure:
128128
risk: The availability of IT systems might be disturbed due to components failures
129129
measure: Redundancies in the IT systems
@@ -231,7 +231,7 @@ Infrastructure Hardening:
231231
iso27001-2017:
232232
- 9.4.1
233233
Usage of a chaos monkey:
234-
risk: Due to manuel changes on a system, they are not replaceable anymore. In
234+
risk: Due to manual changes on a system, they are not replaceable anymore. In
235235
case of a crash it might happen that a planned redundant system is unavailable.
236236
In addition, it is hard to replay manual changes.
237237
measure: A randomized periodically shutdown of systems makes sure, that nobody
@@ -266,7 +266,7 @@ Infrastructure Hardening:
266266
- not explicitly covered by ISO 27001 - too specific
267267
Usage of test and production environments:
268268
risk: Security tests are not running regularly because test environments are missing
269-
measure: A production and a production like envirnoment is used
269+
measure: A production and a production like environment is used
270270
difficultyOfImplementation:
271271
knowledge: 3
272272
time: 3

data-new/InformationGathering/Logging.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Logging:
3737
- 12.4.1
3838
- 18.1.1
3939
Logging of security events:
40-
risk: No track of security-relevant events makes it harder to analyse an incident.
40+
risk: No track of security-relevant events makes it harder to analyze an incident.
4141
measure: Security-relevant events like login/logout or creation, change, deletion
4242
of users should be logged.
4343
difficultyOfImplementation:
@@ -73,7 +73,7 @@ Logging:
7373
risk: Detection of security related events with hints on different systems/tools/metrics
7474
is not possible.
7575
measure: Events are correlated on one system. For example the correlation and
76-
visualisation of failed login attempts combined with successful login attempts.
76+
visualization of failed login attempts combined with successful login attempts.
7777
difficultyOfImplementation:
7878
knowledge: 4
7979
time: 4

data-new/InformationGathering/Monitoring.yaml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
Monitoring:
3-
Advanced availablity and stability metrics:
3+
Advanced availability and stability metrics:
44
risk: Trends and advanced attacks are not detected.
55
measure: Advanced metrics are gathered in relation to availability and stability.
66
For example unplanned downtime's per year.
@@ -33,7 +33,7 @@ Monitoring:
3333
iso27001-2017:
3434
- 12.6.1
3535
Alerting:
36-
risk: Incidents are discovered after they happend.
36+
risk: Incidents are discovered after they happened.
3737
measure: |
3838
Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
3939
difficultyOfImplementation:
@@ -86,11 +86,11 @@ Monitoring:
8686
iso27001-2017:
8787
- not explicitly covered by ISO 27001 - too specific
8888
- 12.1.3
89-
Defence metrics:
89+
Defense metrics:
9090
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent
9191
attacks. It is not known how many attacks has been detected and blocked.
9292
measure: |
93-
Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
93+
Gathering of defense metrics like TCP/UDP sources enables to assume the geographic location of the request.
9494
Assuming a Kubernetes cluster with an egress-traffic filter (e.g. IP/domain based), an alert might be send out in case of every violation. For ingress-traffic, alerting might not even be considered.
9595
difficultyOfImplementation:
9696
knowledge: 3
@@ -100,7 +100,7 @@ Monitoring:
100100
level: 4
101101
dependsOn:
102102
- Visualized metrics
103-
- Filter outcoing traffic
103+
- Filter outgoing traffic
104104
samm2: o-incident-management|A|2
105105
iso27001-2017:
106106
- 12.4.1
@@ -165,7 +165,7 @@ Monitoring:
165165
Simple system metrics:
166166
risk: Without simple metrics analysis of incidents are hard. In case an application
167167
uses a lot of CPU from time to time, it is hard for a developer to find out
168-
the source with linux commands.
168+
the source with Linux commands.
169169
measure: Gathering of system metrics helps to identify incidents and specially
170170
bottlenecks like in CPU usage, memory usage and hard disk usage.
171171
difficultyOfImplementation:
@@ -174,7 +174,7 @@ Monitoring:
174174
resources: 2
175175
usefulness: 5
176176
level: 1
177-
implementation: collectd
177+
implementation: collected
178178
samm2: o-incident-management|A|1
179179
iso27001-2017:
180180
- 12.1.3

data-new/TestAndVerification/Consolidation.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Consolidation:
2323
risk: Improper examination of vulnerabilities leads to no visibility at all.
2424
measure: Quality gates for found vulnerabilities are defined. In the start it
2525
is important to not overload the security analyst, therefore the recommendation
26-
is to start with alerting of high cirital vulnerabilities.
26+
is to start with alerting of high critical vulnerabilities.
2727
difficultyOfImplementation:
2828
knowledge: 1
2929
time: 1
@@ -79,7 +79,7 @@ Consolidation:
7979
- 8.2.2
8080
- 8.2.3
8181
Simple false positive treatment:
82-
risk: As false positive occure during each test, all vulnerabilities might be
82+
risk: As false positive occur during each test, all vulnerabilities might be
8383
ignored.
8484
measure: False positives are suppressed so they will not show up on the next tests
8585
again. Most security tools have the possibility to suppress false positives.

data-new/TestAndVerification/DynamicDepthForInfrastructure.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -52,18 +52,18 @@ Dynamic depth for infrastructure:
5252
iso27001-2017:
5353
- 9.4.3
5454
Test network segmentation:
55-
risk: Wrong or no network segmentation of pods makes it easyer for an attacker
55+
risk: Wrong or no network segmentation of pods makes it easier for an attacker
5656
to access a database and extract or modify data.
57-
measure: Cluster interal test needs to be performed. Integration of fine granulated
58-
network segmenation (also between pods in the same namespace).
57+
measure: Cluster internal test needs to be performed. Integration of fine granulated
58+
network segmentation (also between pods in the same namespace).
5959
difficultyOfImplementation:
6060
knowledge: 2
6161
time: 2
6262
resources: 1
6363
usefulness: 3
6464
level: 2
6565
implementation: <a href="https://github.com/controlplaneio/netassert">netassert</a>
66-
dependendsOn: Segmented networks for virtual environments
66+
dependsOn: Segmented networks for virtual environments
6767
samm2: v-security-testing|A|2
6868
iso27001-2017:
6969
- 13.1.3
@@ -72,7 +72,7 @@ Dynamic depth for infrastructure:
7272
Test for exposed services:
7373
risk: Standard network segmentation and firewalling has not been performed, leading
7474
to world open cluster management ports.
75-
measure: With the help of tools the network configuration of unintenonal exposed
75+
measure: With the help of tools the network configuration of unintentional exposed
7676
cluster(s) are tested. To identify clusters, all subdomains might need to be
7777
identified with a tool like OWASP Amass to perform portscans based o the result.
7878
difficultyOfImplementation:

data-new/TestAndVerification/StaticDepthForApplications.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,9 +138,9 @@ Static depth for applications:
138138
samm2: v-security-testing|A|2
139139
iso27001-2017:
140140
- 12.6.1
141-
Usage of multiple analysers:
142-
risk: Each vulnerability analyser has different opportunities. By using just one
143-
analyser, some vulnerabilities might not be found.
141+
Usage of multiple analyzers:
142+
risk: Each vulnerability analyzer has different opportunities. By using just one
143+
analyzer, some vulnerabilities might not be found.
144144
measure: Usage of multiple static tools to find more vulnerabilities.
145145
difficultyOfImplementation:
146146
knowledge: 3

0 commit comments

Comments
 (0)