Skip to content

Commit 2a6eba9

Browse files
committed
add id/title to the top and not on the bottom
1 parent 9a84a8b commit 2a6eba9

137 files changed

Lines changed: 273 additions & 273 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

data-new/BuildAndDeployment/Build/1/DefinedBuildProcess.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: DefinedBuildProcess
3+
title: Defined build process
24
risk: Performing builds without a defined process is error prone. For example, as
35
a result of incorrect security related configuration.
46
measure: A well defined build process lowers the possibility of errors during the
@@ -18,6 +20,4 @@ samm2: i-secure-build|A|1
1820
iso27001-2017:
1921
- 12.1.1
2022
- 14.2.2
21-
title: Defined build process
22-
id: DefinedBuildProcess
2323
...

data-new/BuildAndDeployment/Build/2/BuildingAndTestingOfArtifactsInVirtualEnvironments.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: BuildingAndTestingOfArtifactsInVirtualEnvironments
3+
title: Building and testing of artifacts in virtual environments
24
risk: While building and testing artifacts, third party systems, application frameworks
35
and 3rd party libraries are used. These might be malicious as a result of vulnerable
46
libraries or because they are altered during the delivery phase.
@@ -19,6 +21,4 @@ implementation:
1921
samm2: i-secure-build|A|2
2022
iso27001-2017:
2123
- 14.2.6
22-
title: Building and testing of artifacts in virtual environments
23-
id: BuildingAndTestingOfArtifactsInVirtualEnvironments
2424
...

data-new/BuildAndDeployment/Build/3/SigningOfArtifacts.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: SigningOfArtifacts
3+
title: Signing of artifacts
24
risk: Unauthorized manipulation of artifacts might be difficult to spot. For example,
35
this may result in images with malicious code in the Docker registry.
46
measure: Digitally signing artifacts for all steps during the build and especially
@@ -17,6 +19,4 @@ samm: OA3-B
1719
samm2: i-secure-build|A|1
1820
iso27001-2017:
1921
- 14.2.6
20-
title: Signing of artifacts
21-
id: SigningOfArtifacts
2222
...

data-new/BuildAndDeployment/Build/3/SigningOfCode.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: SigningOfCode
3+
title: Signing of code
24
risk: Unauthorized manipulation of source code might be difficult to spot.
35
measure: Digitally signing commits helps to prevent unauthorized manipulation of source
46
code.
@@ -14,6 +16,4 @@ samm: OA3-B
1416
samm2: i-secure-build|A|2
1517
iso27001-2017:
1618
- 14.2.6
17-
title: Signing of code
18-
id: SigningOfCode
1919
...

data-new/BuildAndDeployment/Deployment/1/DefinedDeploymentProcess.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: DefinedDeploymentProcess
3+
title: Defined deployment process
24
risk: Deployments without a defined process are error prone thus allowing old or untested
35
artifact to be deployed.
46
measure: A defined deployment process significantly lowers the likelihood of errors
@@ -13,6 +15,4 @@ samm2: i-secure-deployment|A|1
1315
iso27001-2017:
1416
- 12.1.1
1517
- 14.2.2
16-
title: Defined deployment process
17-
id: DefinedDeploymentProcess
1818
...

data-new/BuildAndDeployment/Deployment/2/BackupBeforeDeployment.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: BackupBeforeDeployment
3+
title: Backup before deployment
24
risk: If errors are experienced during the deployment process you want to deploy an
35
old release. However, due to changes in the database this is often unfeasible.
46
measure: Performing automated backups before deployment can help facilitate deployments
@@ -17,6 +19,4 @@ samm2: TODO
1719
iso27001-2017:
1820
- "12.3"
1921
- 14.2.6
20-
title: Backup before deployment
21-
id: BackupBeforeDeployment
2222
...

data-new/BuildAndDeployment/Deployment/2/EnvironmentDependingConfigurationParameters.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: EnvironmentDependingConfigurationParameters
3+
title: Environment depending configuration parameters
24
risk: Attackers who compromise source code can see confidential access information
35
like database credentials.
46
measure: Configuration parameters are set for each environment not in the source code.
@@ -13,6 +15,4 @@ samm2: i-secure-deployment|B|1
1315
iso27001-2017:
1416
- 9.4.5
1517
- 14.2.6
16-
title: Environment depending configuration parameters
17-
id: EnvironmentDependingConfigurationParameters
1818
...

data-new/BuildAndDeployment/Deployment/2/UsageOfTrustedImages.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: UsageOfTrustedImages
3+
title: Usage of trusted images
24
risk: Developers or operations might start random images in the production cluster
35
which have malicous code or known vulnerabilities.
46
measure: Create image assessment criteria, perform an evaluation of images and create
@@ -16,6 +18,4 @@ iso27001-2017:
1618
- 15.1.2
1719
- 15.1.3
1820
- 14.1.3
19-
title: Usage of trusted images
20-
id: UsageOfTrustedImages
2121
...

data-new/BuildAndDeployment/Deployment/3/HandoverOfConfidentialParameters.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: HandoverOfConfidentialParameters
3+
title: Handover of confidential parameters
24
risk: Attackers who compromise a system can see confidential access information like
35
database credentials. Parameters are often used to set credentials, for example
46
by starting containers or applications. These parameters can often be seen by any
@@ -21,6 +23,4 @@ iso27001-2017:
2123
- 9.4.3
2224
- 9.4.1
2325
- 10.1.2
24-
title: Handover of confidential parameters
25-
id: HandoverOfConfidentialParameters
2626
...

data-new/BuildAndDeployment/Deployment/3/InventoryOfRunningArtifacts.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
id: InventoryOfRunningArtifacts
3+
title: Inventory of running artifacts
24
risk: In case a vulnerability of severity high or critical exists, it needs to be
35
known where an artifacts with that vulnerability is deployed with which dependencies.
46
measure: A documented inventory or a possibility to gather the needed information
@@ -14,6 +16,4 @@ samm2: o-incident-management|TODO
1416
iso27001-2017:
1517
- "8.1"
1618
- "8.2"
17-
title: Inventory of running artifacts
18-
id: InventoryOfRunningArtifacts
1919
...

0 commit comments

Comments
 (0)