22Build and Deployment :
33 Deployment :
44 Blue/Green Deployment :
5- risk : A new artifacts version can have unknown defects.
6- measure : By having multiple production environments, a deployment can be performant
7- on the first environment to spot possible defects before it is deployment
8- in the production environment(s)
5+ risk : A new artifact's version can have unknown defects.
6+ measure : |-
7+ Using a blue/green deployment strategy increases application availability
8+ and reduces deployment risk by simplifying the rollback process if a deployment fails.
99 difficultyOfImplementation :
1010 knowledge : 1
1111 time : 2
@@ -20,21 +20,21 @@ Build and Deployment:
2020 samm2 :
2121 - TODO
2222 iso27001-2017 :
23- - 17.2.1
24- - 12.1.1
25- - 12.1.2
26- - 12.1.4
23+ - 17.2.1 # Availability of information processing facilities
24+ - 12.1.1 # Documented operational procedures
25+ - 12.1.2 # Change management
26+ - 12.1.4 # Separation of development,testing and operational environments
2727 - 12.5.1
2828 - 14.2.9
2929 isImplemented : false
3030 evidence : " "
3131 comments : " "
3232 Defined decommissioning process :
33- risk : Not used applications erode and are not maintained. As an evil actor,
34- I exploit known vulnerabilities in the not maintained applicaitons to perform
35- latteral movement within the organization.
36- measure : By having a clear decommissioning process, applicaitons not used are
37- not running anymore and can therefore not be explointed .
33+ risk : >-
34+ Unused applications are not maintained and may contain vulnerabilities.
35+ Once exploited they can be used to attack other applications or
36+ to perform lateral movements within the organization.
37+ measure : A clear decommissioning process ensures the removal of unused applications .
3838 difficultyOfImplementation :
3939 knowledge : 1
4040 time : 2
@@ -50,10 +50,13 @@ Build and Deployment:
5050 evidence : " "
5151 comments : " "
5252 Defined deployment process :
53- risk : Deployments without a defined process are error prone thus allowing old
54- or untested artifact to be deployed.
55- measure : A defined deployment process significantly lowers the likelihood of
56- errors during the deployment phase.
53+ risk : >-
54+ Deployment of insecure or malfunctioning artifacts.
55+ measure : >-
56+ Defining a deployment process ensures that there are
57+ established criteria in terms of functionalities,
58+ security, compliance, and performance,
59+ and that the artifacts meet them.
5760 difficultyOfImplementation :
5861 knowledge : 2
5962 time : 2
@@ -75,19 +78,23 @@ Build and Deployment:
7578 evidence : " "
7679 comments : " "
7780 Environment depending configuration parameters (secrets) :
78- risk : ' - Parameters are often used to set credentials, for example by starting
79- containers or applications; these parameters can often be seen by any one
80- listing running processes on the target system.'
81- measure : |
82- Configuration parameters are set for each environment not in the source code.
83- By using encryption, it is harder to read credentials , e.g. from the file system. Also, the usage of a credential management system can help protect credentials.
81+ risk : >-
82+ Unauthorized access to secrets stored in source code
83+ or in artifacts (e.g. container images)
84+ through process listing (e.g. ps -ef).
85+ measure : >-
86+ Set configuration parameters via environment variables
87+ stored using specific platform functionalities
88+ or secrets management systems
89+ (e.g. Kubernetes secrets or Hashicorp Vault).
8490 difficultyOfImplementation :
8591 knowledge : 2
8692 time : 2
8793 resources : 1
8894 usefulness : 4
8995 level : 2
90- implementation : []
96+ implementation :
97+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/hasicorp-vault
9198 references :
9299 samm2 :
93100 - I-SD-1-B
@@ -101,8 +108,10 @@ Build and Deployment:
101108 risk : ' - Parameters are often used to set credentials, for example by starting
102109 containers or applications; these parameters can often be seen by any one
103110 listing running processes on the target system.'
104- measure : By using encryption, it is harder to read credentials , e.g. from the
105- file system. Also, the usage of a credential management system can help protect
111+ measure : >-
112+ Encryption ensures confidentiality of credentials
113+ e.g. from unauthorized access on the file system.
114+ Also, the usage of a credential management system can help protect
106115 credentials.
107116 difficultyOfImplementation :
108117 knowledge : 2
0 commit comments