You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once requirements are gathered and analysis is performed, implementation specifics need to be defined. The outcome of this stage is usually a diagram outlining data flows and a general system architecture. This presents an opportunity for both threat modeling and attaching security considerations to every ticket and epic that is the outcome of this stage.
Last, if the organisation maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
78
+
Last, if the organizations maps Features to Epics, the Security Knowledge Framework (SKF) can be used to facilitate this process by leveraging it's questionnaire function.
Organisations can use these to add solid security considerations at the start of the Software Development or Procurement process.
30
+
Organizations can use these to add solid security considerations at the start of the Software Development or Procurement process.
31
31
32
32
These general security considerations can be audited by using a subsection of the ASVS controls in section V1 as a questionnaire. This process attempts to ensure that every feature has concrete security considerations.
33
33
34
-
In case of internal development and if the organisation maps Features to Epics, the [Security Knowledge Framework](https://securityknowledgeframework.org/) can be used to facilitate this process by leveraging its questionnaire function, shown below.
34
+
In case of internal development and if the organization maps Features to Epics, the [Security Knowledge Framework](https://securityknowledgeframework.org/) can be used to facilitate this process by leveraging its questionnaire function, shown below.
Copy file name to clipboardExpand all lines: data-new/InformationGathering/Monitoring.yaml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
Monitoring:
3
-
Advanced availablity and stability metrics:
3
+
Advanced availability and stability metrics:
4
4
risk: Trends and advanced attacks are not detected.
5
5
measure: Advanced metrics are gathered in relation to availability and stability.
6
6
For example unplanned downtime's per year.
@@ -33,7 +33,7 @@ Monitoring:
33
33
iso27001-2017:
34
34
- 12.6.1
35
35
Alerting:
36
-
risk: Incidents are discovered after they happend.
36
+
risk: Incidents are discovered after they happened.
37
37
measure: |
38
38
Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
39
39
difficultyOfImplementation:
@@ -86,11 +86,11 @@ Monitoring:
86
86
iso27001-2017:
87
87
- not explicitly covered by ISO 27001 - too specific
88
88
- 12.1.3
89
-
Defence metrics:
89
+
Defense metrics:
90
90
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent
91
91
attacks. It is not known how many attacks has been detected and blocked.
92
92
measure: |
93
-
Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
93
+
Gathering of defense metrics like TCP/UDP sources enables to assume the geographic location of the request.
94
94
Assuming a Kubernetes cluster with an egress-traffic filter (e.g. IP/domain based), an alert might be send out in case of every violation. For ingress-traffic, alerting might not even be considered.
95
95
difficultyOfImplementation:
96
96
knowledge: 3
@@ -100,7 +100,7 @@ Monitoring:
100
100
level: 4
101
101
dependsOn:
102
102
- Visualized metrics
103
-
- Filter outcoing traffic
103
+
- Filter outgoing traffic
104
104
samm2: o-incident-management|A|2
105
105
iso27001-2017:
106
106
- 12.4.1
@@ -165,7 +165,7 @@ Monitoring:
165
165
Simple system metrics:
166
166
risk: Without simple metrics analysis of incidents are hard. In case an application
167
167
uses a lot of CPU from time to time, it is hard for a developer to find out
168
-
the source with linux commands.
168
+
the source with Linux commands.
169
169
measure: Gathering of system metrics helps to identify incidents and specially
170
170
bottlenecks like in CPU usage, memory usage and hard disk usage.
0 commit comments