You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Deployment.yaml
+6-10Lines changed: 6 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -70,14 +70,15 @@ Build and Deployment:
70
70
Defined deployment process:
71
71
uuid: 74938a3f-1269-49b9-9d0f-c43a79a1985a
72
72
description: |
73
-
A defined deployment process is a documented and automated set of steps for releasing software into production. It ensures that deployments are consistent, secure, and auditable, reducing the risk of errors and unauthorized changes. This process should include validation, approval, and rollback mechanisms.
73
+
A defined deployment process is a documented and automated set of steps for releasing software into production. It ensures that deployments are consistent, secure, and auditable, reducing the risk of errors and unauthorized changes.
74
74
risk: >-
75
75
Deployment based human routines are error prone, and of insecure or malfunctioning artifacts.
76
76
measure: >-
77
-
Defining a deployment process ensures that there are
78
-
established criteria in terms of functionalities,
79
-
security, compliance, and performance,
80
-
and that the artifacts meet them.
77
+
Defining a deployment process ensures that there are established criteria in terms of functionalities, security, compliance, and performance, and that the artifacts meet them.
78
+
assessment: |
79
+
- Deployment process is documented and available to relevant staff
80
+
- All deployment steps are automated
81
+
- Provide audit logs or evidence of deployments
81
82
level: 1
82
83
difficultyOfImplementation:
83
84
knowledge: 2
@@ -98,11 +99,6 @@ Build and Deployment:
98
99
iso27001-2022:
99
100
- 5.37
100
101
- 8.32
101
-
assessment: |
102
-
- Deployment process is documented and available to relevant staff
103
-
- All deployment steps are automated
104
-
- Rollback procedures are defined and tested [Keep??? Delete???]
Copy file name to clipboardExpand all lines: src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -420,7 +420,8 @@ Culture and Organization:
420
420
measure: |
421
421
Make security consulting available to teams on request, ensuring that expert advice is accessible when needed to address security concerns during development.
422
422
assessment: |
423
-
Records show that teams have access to security consulting services and have used them when needed. Documentation of consultations and resulting actions is available for review.
423
+
- Show evidence that an it security expert is available for questions at least quarterly.
424
+
- Documentation of consultations and resulting actions is available for review.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/InformationGathering/Monitoring.yaml
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -366,10 +366,9 @@ Information Gathering:
366
366
risk: |
367
367
Without monitoring system metrics, it is difficult to detect incidents or performance issues, leading to delayed response, reduced availability, and increased risk of undetected attacks.
368
368
measure: |
369
-
Collect and monitor key system metrics, including CPU, memory, and disk usage. Set up alerts for abnormal resource consumption or patterns that may indicate incidents or attacks.
369
+
Collect and monitor key system metrics, including CPU, memory, and disk usage.
370
370
assessment: |
371
371
- Basic system metrics are monitored and reviewed regularly
372
-
- Alerting outside given thresholds are implemented
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/Consolidation.yaml
+7-9Lines changed: 7 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -138,13 +138,13 @@ Test and Verification:
138
138
Simple false positive treatment:
139
139
uuid: c1acc8af-312e-4503-a817-a26220c993a0
140
140
description: |
141
-
Security tests may produce false positives—findings that are incorrectly identified as vulnerabilities.
141
+
Security tests may produce false positives (or _"false alarms"_), findings that are incorrectly identified as vulnerabilities.
142
142
143
-
It is important distinguish these from true vulnerabilities to avoid wasting time and resources on non-issues.
143
+
It is important distinguish these from true positive vulnerabilities to avoid wasting time and resources on non-issues.
144
144
145
145
False positive treatment ensures that findings from security tests are triaged and documented, allowing teams to distinguish between real vulnerabilities and false positives. This reduces unnecessary work and helps maintain focus on true risks.
146
146
147
-
Some positive findings might be considered an accepted risk by the organization. This must also be documented.
147
+
Some positive findings might be considered an _accepted risk_ by the organization. This must also be documented.
148
148
risk: |
149
149
If false positives are not managed, teams may ignore all findings, leading to real vulnerabilities being overlooked and increasing the risk of exploitation. Specially, if tests are automated an run daily.
150
150
measure: |
@@ -278,18 +278,17 @@ Test and Verification:
278
278
- 5.25
279
279
tags: ["vuln-action", "defect-management"]
280
280
comments: ""
281
-
Treatment of defects with severity high or higher:
281
+
Treatment of defects with high or critical severity:
282
282
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
283
283
description: |
284
284
All security problems that are rated as "high" or "critical" must be fixed before the software can be released or used in production. This means that if a serious vulnerability is found, it cannot be ignored or postponed.
285
285
risk: |
286
286
If serious security problems are not fixed, attackers could exploit them to steal data, disrupt services, or cause other harm. Ignoring these issues puts the organization, its customers, and its reputation at risk.
287
287
measure: |
288
-
- Make it a rule that all high or critical security findings must be fixed before the software is approved for release or use.
288
+
- Make it a rule that all _high_ or _critical_ security findings must be fixed before the software is approved for release or use.
289
289
- Track these issues and make sure they are resolved quickly.
290
-
- Pay extra attention to Known Exploited Vulnerabilities (KEV) from CISA and EPSS scores when prioritizing fixes.
291
290
assessment: |
292
-
There is clear evidence that all high or critical security issues are tracked and fixed before release. No high or critical issues remain open in production systems.
291
+
- Provide evidence that vulnerabilities are treated within the defined time frame in production. For example via the DSOMM activity [Number of vulnerabilities/severity](./activity-description?uuid=bc548cba-cb82-4f76-bd4b-325d9d256279) or [Patching mean time to resolution via PR](./activity-description?uuid=86d490b9-d798-4a5b-a011-ab9688014c46) with extra deployment statistics.
293
292
comments: False positive analysis, specially for static analysis, is time consuming.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/StaticDepthForApplications.yaml
+9-4Lines changed: 9 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -322,16 +322,21 @@ Test and Verification:
322
322
comments: ""
323
323
Exploit likelihood estimation:
324
324
uuid: f2f0f274-c1a0-4501-92fe-7fc4452bc8ad
325
-
risk: |-
325
+
description: |
326
+
Severity-based vulnerability triage alone generates a lot false positives, requiring a more refined approach.
327
+
328
+
Use the likelihood of exploitation by using *known exploited vulnerabilities* (CISA KEV), or prediction models such as
329
+
*Exploit Prediction Scoring System* (EPSS).
330
+
risk: |
326
331
Without proper prioritization, organizations may waste time and effort on low-risk vulnerabilities while neglecting critical ones.
327
-
measure: Estimate the likelihood of exploitation by using data (CISA KEV) from the past or prediction models (e.g. Exploit Prediction Scoring System, EPSS).
328
-
description: Severity-based vulnerability triage alone generates a lot false positives, requiring a more refined approach.
332
+
measure: |
333
+
Use CISA KEV and EPSS to prioritize vulnerabilities that are more likely to be exploited.
329
334
difficultyOfImplementation:
330
335
knowledge: 2
331
336
time: 2
332
337
resources: 2
333
338
usefulness: 4
334
-
level: 3
339
+
level: 2
335
340
dependsOn:
336
341
- d918cd44-a972-43e9-a974-eff3f4a5dcfe # SCA for server
0 commit comments