Skip to content

Commit 1cf5f0f

Browse files
committed
Included feedback from PR #46
1 parent b9fbd51 commit 1cf5f0f

File tree

5 files changed

+25
-26
lines changed

5 files changed

+25
-26
lines changed

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -70,14 +70,15 @@ Build and Deployment:
7070
Defined deployment process:
7171
uuid: 74938a3f-1269-49b9-9d0f-c43a79a1985a
7272
description: |
73-
A defined deployment process is a documented and automated set of steps for releasing software into production. It ensures that deployments are consistent, secure, and auditable, reducing the risk of errors and unauthorized changes. This process should include validation, approval, and rollback mechanisms.
73+
A defined deployment process is a documented and automated set of steps for releasing software into production. It ensures that deployments are consistent, secure, and auditable, reducing the risk of errors and unauthorized changes.
7474
risk: >-
7575
Deployment based human routines are error prone, and of insecure or malfunctioning artifacts.
7676
measure: >-
77-
Defining a deployment process ensures that there are
78-
established criteria in terms of functionalities,
79-
security, compliance, and performance,
80-
and that the artifacts meet them.
77+
Defining a deployment process ensures that there are established criteria in terms of functionalities, security, compliance, and performance, and that the artifacts meet them.
78+
assessment: |
79+
- Deployment process is documented and available to relevant staff
80+
- All deployment steps are automated
81+
- Provide audit logs or evidence of deployments
8182
level: 1
8283
difficultyOfImplementation:
8384
knowledge: 2
@@ -98,11 +99,6 @@ Build and Deployment:
9899
iso27001-2022:
99100
- 5.37
100101
- 8.32
101-
assessment: |
102-
- Deployment process is documented and available to relevant staff
103-
- All deployment steps are automated
104-
- Rollback procedures are defined and tested [Keep??? Delete???]
105-
- Provide audit logs or evidence of deployments
106102
isImplemented: false
107103
evidence: ""
108104
comments: ""

src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -420,7 +420,8 @@ Culture and Organization:
420420
measure: |
421421
Make security consulting available to teams on request, ensuring that expert advice is accessible when needed to address security concerns during development.
422422
assessment: |
423-
Records show that teams have access to security consulting services and have used them when needed. Documentation of consultations and resulting actions is available for review.
423+
- Show evidence that an it security expert is available for questions at least quarterly.
424+
- Documentation of consultations and resulting actions is available for review.
424425
difficultyOfImplementation:
425426
knowledge: 3
426427
time: 1

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -366,10 +366,9 @@ Information Gathering:
366366
risk: |
367367
Without monitoring system metrics, it is difficult to detect incidents or performance issues, leading to delayed response, reduced availability, and increased risk of undetected attacks.
368368
measure: |
369-
Collect and monitor key system metrics, including CPU, memory, and disk usage. Set up alerts for abnormal resource consumption or patterns that may indicate incidents or attacks.
369+
Collect and monitor key system metrics, including CPU, memory, and disk usage.
370370
assessment: |
371371
- Basic system metrics are monitored and reviewed regularly
372-
- Alerting outside given thresholds are implemented
373372
level: 1
374373
difficultyOfImplementation:
375374
knowledge: 2

src/assets/YAML/default/TestAndVerification/Consolidation.yaml

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -138,13 +138,13 @@ Test and Verification:
138138
Simple false positive treatment:
139139
uuid: c1acc8af-312e-4503-a817-a26220c993a0
140140
description: |
141-
Security tests may produce false positivesfindings that are incorrectly identified as vulnerabilities.
141+
Security tests may produce false positives (or _"false alarms"_), findings that are incorrectly identified as vulnerabilities.
142142
143-
It is important distinguish these from true vulnerabilities to avoid wasting time and resources on non-issues.
143+
It is important distinguish these from true positive vulnerabilities to avoid wasting time and resources on non-issues.
144144
145145
False positive treatment ensures that findings from security tests are triaged and documented, allowing teams to distinguish between real vulnerabilities and false positives. This reduces unnecessary work and helps maintain focus on true risks.
146146
147-
Some positive findings might be considered an accepted risk by the organization. This must also be documented.
147+
Some positive findings might be considered an _accepted risk_ by the organization. This must also be documented.
148148
risk: |
149149
If false positives are not managed, teams may ignore all findings, leading to real vulnerabilities being overlooked and increasing the risk of exploitation. Specially, if tests are automated an run daily.
150150
measure: |
@@ -278,18 +278,17 @@ Test and Verification:
278278
- 5.25
279279
tags: ["vuln-action", "defect-management"]
280280
comments: ""
281-
Treatment of defects with severity high or higher:
281+
Treatment of defects with high or critical severity:
282282
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
283283
description: |
284284
All security problems that are rated as "high" or "critical" must be fixed before the software can be released or used in production. This means that if a serious vulnerability is found, it cannot be ignored or postponed.
285285
risk: |
286286
If serious security problems are not fixed, attackers could exploit them to steal data, disrupt services, or cause other harm. Ignoring these issues puts the organization, its customers, and its reputation at risk.
287287
measure: |
288-
- Make it a rule that all high or critical security findings must be fixed before the software is approved for release or use.
288+
- Make it a rule that all _high_ or _critical_ security findings must be fixed before the software is approved for release or use.
289289
- Track these issues and make sure they are resolved quickly.
290-
- Pay extra attention to Known Exploited Vulnerabilities (KEV) from CISA and EPSS scores when prioritizing fixes.
291290
assessment: |
292-
There is clear evidence that all high or critical security issues are tracked and fixed before release. No high or critical issues remain open in production systems.
291+
- Provide evidence that vulnerabilities are treated within the defined time frame in production. For example via the DSOMM activity [Number of vulnerabilities/severity](./activity-description?uuid=bc548cba-cb82-4f76-bd4b-325d9d256279) or [Patching mean time to resolution via PR](./activity-description?uuid=86d490b9-d798-4a5b-a011-ab9688014c46) with extra deployment statistics.
293292
comments: False positive analysis, specially for static analysis, is time consuming.
294293
level: 1
295294
difficultyOfImplementation:
@@ -307,12 +306,11 @@ Test and Verification:
307306
- 8.8
308307
- 5.25
309308
implementation:
310-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/cisa-kev
311309
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/trivy
312310
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/grype
313311
tags: ["vuln-action", "defect-management"]
314312
evidence: ""
315-
Treatment of defects with severity middle:
313+
Treatment of defects with medium severity:
316314
uuid: 9cac3341-fe83-4079-bef2-bfc4279eb594
317315
risk: Vulnerabilities with severity middle are not visible.
318316
measure: Vulnerabilities with severity middle are added to the quality gate.

src/assets/YAML/default/TestAndVerification/StaticDepthForApplications.yaml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -322,16 +322,21 @@ Test and Verification:
322322
comments: ""
323323
Exploit likelihood estimation:
324324
uuid: f2f0f274-c1a0-4501-92fe-7fc4452bc8ad
325-
risk: |-
325+
description: |
326+
Severity-based vulnerability triage alone generates a lot false positives, requiring a more refined approach.
327+
328+
Use the likelihood of exploitation by using *known exploited vulnerabilities* (CISA KEV), or prediction models such as
329+
*Exploit Prediction Scoring System* (EPSS).
330+
risk: |
326331
Without proper prioritization, organizations may waste time and effort on low-risk vulnerabilities while neglecting critical ones.
327-
measure: Estimate the likelihood of exploitation by using data (CISA KEV) from the past or prediction models (e.g. Exploit Prediction Scoring System, EPSS).
328-
description: Severity-based vulnerability triage alone generates a lot false positives, requiring a more refined approach.
332+
measure: |
333+
Use CISA KEV and EPSS to prioritize vulnerabilities that are more likely to be exploited.
329334
difficultyOfImplementation:
330335
knowledge: 2
331336
time: 2
332337
resources: 2
333338
usefulness: 4
334-
level: 3
339+
level: 2
335340
dependsOn:
336341
- d918cd44-a972-43e9-a974-eff3f4a5dcfe # SCA for server
337342
implementation:

0 commit comments

Comments
 (0)