Skip to content

Commit a5e92d9

Browse files
authored
Merge pull request #4 from vbakke/feat/v4-review-level-1-urlreferences
Updated external URLs
2 parents 4d208b2 + f7f5f16 commit a5e92d9

File tree

7 files changed

+73
-50
lines changed

7 files changed

+73
-50
lines changed

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Implementation:
4040
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-asvs
4141
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-masvs
4242
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/apimaturity
43+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
4344
references:
4445
samm2:
4546
- D-SR-A-2
@@ -172,6 +173,7 @@ Implementation:
172173
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-asvs
173174
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-masvs
174175
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/apimaturity
176+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
175177
references:
176178
samm2:
177179
- D-SR-A-3
@@ -202,6 +204,7 @@ Implementation:
202204
implementation:
203205
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-asvs
204206
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-masvs
207+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
205208
references:
206209
samm2:
207210
- D-SR-A-3

src/assets/YAML/default/Implementation/DevelopmentAndSourceControl.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ Implementation:
1616
description: ""
1717
implementation:
1818
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/stylecop
19-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sonarqube
19+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sonarqube-lint
20+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/eslint
2021
references:
2122
samm2:
2223
- V-ST-A-1

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -675,7 +675,8 @@ Implementation:
675675
level: 3
676676
dependsOn:
677677
- Context-aware output encoding
678-
implementation: []
678+
implementation:
679+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
679680
references:
680681
samm2:
681682
- O-EM-A-1
@@ -713,7 +714,8 @@ Implementation:
713714
level: 4
714715
dependsOn:
715716
- WAF baseline
716-
implementation: []
717+
implementation:
718+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
717719
references:
718720
samm2:
719721
- O-EM-A-2
@@ -756,7 +758,8 @@ Implementation:
756758
level: 5
757759
dependsOn:
758760
- WAF medium
759-
implementation: []
761+
implementation:
762+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-myths
760763
references:
761764
samm2:
762765
- O-EM-A-2

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,7 @@ Information Gathering:
127127
level: 4
128128
dependsOn:
129129
- Visualized metrics
130-
implementation:
131-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/https-ht-transpare
130+
implementation: []
132131
references:
133132
samm2:
134133
- O-IM-A-2

src/assets/YAML/default/TestAndVerification/StaticDepthForApplications.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,8 @@ Test and Verification:
304304
implementation:
305305
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/pmd
306306
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/stylecop
307-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sonarqube
307+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/eslint
308+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sonarqube-lint
308309
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/github-super-linter
309310
references:
310311
samm2:

src/assets/YAML/default/implementations.yaml

Lines changed: 41 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ implementations:
99
uuid: 86c6bdba-73c0-4c99-bbda-81b85c9fe2a4
1010
name: Enforcement of commit signing
1111
tags: [signing]
12-
url: https://docs.github.com/en/repositories/configuring-branches-and-merges-in-your-repository/defining-the-mergeability-of-pull-requests/managing-a-branch-protection-rule
12+
url: https://docs.github.com/en/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule
1313
description: |-
1414
Usage of branch protection rules
1515
signing-of-commits:
@@ -92,15 +92,15 @@ implementations:
9292
kubernetes-admission:
9393
uuid: 2a76300f-6b1f-4a51-b925-134c36b723af
9494
name:
95-
Kubernetes Admission Controller can whitelist registries and/or whitelist
96-
a signing key.
95+
Kubernetes Admission Controller can whitelist registries and/or whitelist a signing key.
9796
tags: []
9897
url: https://medium.com/slalom-technology/build-a-kubernetes-dynamic-admission-controller-for-container-registry-whitelisting-b46fe020e22d
98+
test-url-expects: [403]
9999
dependabot:
100100
uuid: d6292c7d-aab7-43d3-a7c6-1e443b5c1aa4
101101
name: dependabot
102102
tags: ["auto-pr", "patching"]
103-
url: https://dependabot.com/
103+
url: https://docs.github.com/en/code-security/getting-started/dependabot-quickstart-guide
104104
renovate:
105105
uuid: 8228266e-e04f-40ba-94c8-bfadc5310920
106106
name: renovate
@@ -141,12 +141,13 @@ implementations:
141141
uuid: be757cb3-63d6-4a63-9c4e-e10b746fd47a
142142
name: Fedora CoreOS
143143
tags: []
144-
url: https://getfedora.org/coreos
144+
url: https://fedoraproject.org/coreos/
145145
distroless-usage:
146146
uuid: a92c4f8f-a918-406a-b1e5-70acfc0477bd
147147
name: Distroless or Alpine
148148
tags: []
149149
url: https://itnext.io/which-container-images-to-use-distroless-or-alpine-96e3dab43a22
150+
test-url-expects: [403]
150151
threat-modeling-play:
151152
uuid: fd0f282b-a065-4464-beed-770c604a5f52
152153
name: Threat Modeling Playbook
@@ -181,10 +182,10 @@ implementations:
181182
uuid: bb5b8988-021b-452a-a914-bd36887b6860
182183
name: "Don't Forget EVIL User stories"
183184
tags: []
184-
url: https://www.owasp.org/index.php/Agile_Software_Development
185+
url: https://medium.com/serious-scrum/evil-user-storys-story-telling-for-it-security-e4a9ec94193c
186+
test-url-expects: [403]
185187
description:
186-
"[Do not Forget EVIL User Stories](https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories)\
187-
\ and [Practical Security Stories and Security Tasks for Agile Development Environments](https://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf)"
188+
"Do not Forget _Evil_ User Stories and [Practical Security Stories and Security Tasks for Agile Development Environments](https://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf)"
188189
libyear:
189190
uuid: 2fff917f-205e-4eab-2e0e-1fab8c04bf33
190191
name: libyear
@@ -196,7 +197,7 @@ implementations:
196197
uuid: 1fff917f-205e-4eab-ae0e-1fab8c04bf3a
197198
name: OWASP Juice Shop
198199
tags: [training]
199-
url: https://github.com/bkimminich/juice-shop
200+
url: https://github.com/juice-shop/juice-shop
200201
description: |-
201202
In case you do not have the budget to hire an external security expert, an option is to use the OWASP JuiceShop on a "hacking Friday"
202203
owasp-cheatsheet-series:
@@ -253,7 +254,7 @@ implementations:
253254
uuid: 7bf90650-a53a-4581-a214-1afd5de3a059
254255
name: OWASP MASVS
255256
tags: []
256-
url: https://github.com/OWASP/owasp-masvs
257+
url: https://github.com/OWASP/masvs
257258
cis-kubernetes-benchmark:
258259
uuid: edaec98d-dac7-4dfd-8ab3-42c471d5b9ff
259260
name: CIS Kubernetes Benchmark for Security
@@ -290,7 +291,7 @@ implementations:
290291
uuid: 9fbc47ad-82bc-46d1-bba9-66815ab79935
291292
name: Attack Matrix Kubernetes
292293
tags: [mitre]
293-
url: https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
294+
url: https://www.microsoft.com/en-US/security/blog/2020/04/02/attack-matrix-kubernetes/
294295
description: |-
295296
Attack matrix for kubernetes
296297
istio:
@@ -378,12 +379,12 @@ implementations:
378379
uuid: 41fda224-2980-443c-bfd4-0a1d4b520cb9
379380
name: HTTP-Basic Authentication
380381
tags: []
381-
url: https://d3fend.mitre.org/dao/artifact/d3f:WebAuthentication/
382+
url: https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Authentication
382383
vpn:
383384
uuid: e506f60b-747b-44b1-8fe8-f67ccd8f290e
384385
name: VPN
385386
tags: []
386-
url: https://d3fend.mitre.org/dao/artifact/d3f:VPN/
387+
url: https://d3fend.mitre.org/dao/artifact/d3f:VPNServer/
387388
for-applications-ch:
388389
uuid: d7fb1f5a-05e3-49f7-ae67-00bfb8f8410c
389390
name: "For applications: Check default encoding"
@@ -401,7 +402,7 @@ implementations:
401402
uuid: ba6bd46c-2069-4f4d-b26c-7334a7553339
402403
name: authentication
403404
tags: []
404-
url: https://d3fend.mitre.org/dao/artifact/d3f:Authentication/
405+
url: https://d3fend.mitre.org/dao/artifact/d3f:AuthenticationServer/
405406
rsyslog:
406407
uuid: 79f88310-d63e-471d-8e63-8c77f2281b66
407408
name: rsyslog
@@ -410,7 +411,7 @@ implementations:
410411
logstash:
411412
uuid: 7a8fad2e-d642-4972-8501-74591b23feab
412413
name: logstash
413-
url: https://www.elastic.co/guide/en/logstash/current/getting-started-with-logstash.html
414+
url: https://www.elastic.co/docs/reference/logstash/getting-started-with-logstash
414415
tags: [tool, logging]
415416
fluentd:
416417
uuid: f5da3a20-ab64-4ecf-b4e1-660c80036e45
@@ -441,13 +442,7 @@ implementations:
441442
uuid: 38fe9d00-df8b-44b6-910d-ca0f02b5c5d3
442443
name: ELK-Stack
443444
tags: []
444-
url: https://www.elastic.co/elk-stack
445-
https-ht-transpare:
446-
uuid: 84ef86ea-ada4-4e10-ae4f-a5bb77dcae5d
447-
name: https://ht.transpare
448-
tags: []
449-
url: https://ht.transparencytoolkit.org/FileServer/FileServer/OLD
450-
description: https://ht.transparencytoolkit.org/FileServer/FileServer/OLD%20Fileserver/books/SICUREZZA/Addison.Wesley.Security.Metrics.Mar.2007.pdf
445+
url: https://www.elastic.co/elastic-stack/
451446
prometheus:
452447
uuid: ddf221df-3517-42e4-b23d-c1d9a162744c
453448
name: Prometheus
@@ -461,7 +456,7 @@ implementations:
461456
uuid: cc2eec82-f3a7-4ae5-9ccb-3d75352b2e4d
462457
name: JUnit
463458
tags: [unittest]
464-
url: https://junit.org/junit5/
459+
url: https://junit.org/
465460
karma:
466461
uuid: fd56720a-ad4b-487c-b4c3-897a688672c4
467462
name: Karma
@@ -518,7 +513,7 @@ implementations:
518513
uuid: 7063cf8c-cd98-480f-8ef7-11cf241d2366
519514
name: OWASP Code Pulse
520515
tags: []
521-
url: https://www.owasp.org/index.php/OWASP_Code_Pulse
516+
url: https://owasp.org/www-project-code-pulse/
522517
ajax-spider:
523518
uuid: 6583fd5f-4314-4b39-9265-de72f861c8cb
524519
name: Ajax Spider
@@ -573,7 +568,7 @@ implementations:
573568
uuid: b99c9d52-dd1a-4aef-8699-65173cf978ce
574569
name: HTC Hydra
575570
tags: [password]
576-
url: https://www.htc-cs.com/en/products/htc-hydra/
571+
url: https://github.com/vanhauser-thc/thc-hydra
577572
netassert:
578573
uuid: fffa6fb9-1fae-4852-88dc-c7086961330c
579574
name: netassert
@@ -588,7 +583,7 @@ implementations:
588583
uuid: f085295e-46a3-4c8d-bbc3-1ac6b9dfcf2a
589584
name: OWASP Amass
590585
tags: []
591-
url: https://github.com/OWASP/Amass
586+
url: https://github.com/owasp-amass/amass
592587
k8spurger:
593588
uuid: 8fea20ad-e332-4aa8-b1f1-aa9deb635dc1
594589
name: K8sPurger
@@ -630,6 +625,7 @@ implementations:
630625
name: npm audit
631626
tags: []
632627
url: https://docs.npmjs.com/cli/audit
628+
test-url-expects: [301]
633629
sigmahq:
634630
uuid: 1adf1ac0-8572-407b-a358-3976d9a225e2
635631
name: SigmaHQ
@@ -641,7 +637,7 @@ implementations:
641637
tags: []
642638
url: https://github.com/wagoodman/dive
643639
clusterscanner:
644-
url: https://github.com/SDA-SE/clusterscanner
640+
url: https://github.com/SDA-SE/cluster-image-scanner
645641
uuid: 3c9ac78c-0fd4-43f4-8211-c915f9ef685f
646642
name: ClusterScanner
647643
tags:
@@ -699,7 +695,7 @@ implementations:
699695
uuid: d90fefc9-4e5d-420f-ac87-eeb165bf0ee6
700696
name: truffleHog
701697
tags: []
702-
url: https://github.com/dxa4481/truffleHog
698+
url: https://github.com/trufflesecurity/trufflehog
703699
go-pillage-registrie:
704700
uuid: 382873e2-8604-4410-ae5e-b0f5ccdee835
705701
name: go-pillage-registries
@@ -736,38 +732,40 @@ implementations:
736732
threat-matrix-for-storage:
737733
uuid: 1c56dbea-e067-44e2-8d3b-0a1205a70617
738734
name: Threat Matrix for Storage
739-
url: https://www.microsoft.com/security/blog/2021/04/08/threat-matrix-for-storage/
735+
url: https://www.microsoft.com/en-US/security/blog/2021/04/08/threat-matrix-for-storage/
740736
tags: [documentation, storage, cluster, kubernetes]
741737
defend-the-core-kubernetes:
742738
uuid: b7a92886-aec9-4bf4-94c4-07cc191a97af
743739
name: Defend the core kubernetes security at every layer
744-
url: https://thenewstack.io/defend-the-core-kubernetes-security-at-every-layer/
740+
url: https://thenewstack.io/defend-the-core-kubernetes-security-at-every-layer/
745741
tags: [documentation, cluster, kubernetes]
746742
business-friendly-vulnerability-metrics:
747743
uuid: 3b99799c-e875-4cc2-aad7-5ce4564a1cde
748744
name: Business friendly vulnerability management metrics
749745
url: https://medium.com/uber-security-privacy/business-friendly-vulnerability-management-metrics-cfd702fd7705
746+
test-url-expects: [403]
750747
tags: [documentation, vulnerability, vulnerability management system]
751748
kubescape:
752749
uuid: 893d9f37-2142-4490-996c-e43b55064d3d
753750
name: kubescape
754-
url: https://github.com/armosec/kubescape
751+
url: https://github.com/kubescape/kubescape
755752
tags: [kubernetes, vulnerability, misconfiguration]
756753
description: _Testing if Kubernetes is deployed securely as defined in Kubernetes Hardening Guidance by to NSA and CISA_
757754
azuredevops:
758755
uuid: b1b88bc5-5a22-4888-a27b-acce3d9fe29a
759756
name: Improve code quality with branch policies
760-
url: https://docs.microsoft.com/en-us/azure/devops/repos/git/branch-policies?view=azure-devops
757+
url: https://learn.microsoft.com/en-us/azure/devops/repos/git/branch-policies?view=azure-devops
761758
tags: [source-code-protection, scm]
762759
github-policies:
763760
uuid: 99211481-de9c-4358-880e-628366416a27
764761
name: About protected branches
765-
url: https://docs.github.com/en/repositories/configuring-branches-and-merges-in-your-repository/defining-the-mergeability-of-pull-requests/about-protected-branches
762+
url: https://docs.github.com/en/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches
766763
tags: [source-code-protection, scm]
767-
sonarqube:
764+
sonarqube-lint:
768765
uuid: aa5ded61-5380-4da6-9474-afc36a397682
769766
name: In-Depth Linting of Your TypeScript While Coding
770-
url: https://blog.sonarsource.com/in-depth-linting-of-your-typescript-while-coding
767+
url: https://medium.com/@elenavilchik/in-depth-linting-of-your-typescript-while-coding-1d084affbf0
768+
test-url-expects: [403]
771769
tags: [ide, linting]
772770
stylecop:
773771
uuid: 0b7ec352-0c36-4de1-8912-617fc6c608fe
@@ -778,26 +776,29 @@ implementations:
778776
uuid: 5b52a841-c281-45fd-b68f-0a93aa6fa398
779777
name: Fortify Extension for Visual Studio Code
780778
url: https://marketplace.visualstudio.com/items?itemName=fortifyvsts.fortify-extension-for-vs-code
779+
test-url-expects: [404]
781780
tags: [ide, sast]
782781
appscan-vscode-extension:
783782
uuid: 3f5a493d-12d0-4468-b9fa-c3e4eae89ffb
784783
name: HCL AppScan CodeSweep
785784
url: https://marketplace.visualstudio.com/items?itemName=HCLTechnologies.hclappscancodesweep
785+
test-url-expects: [404]
786786
tags: [ide, sast]
787787
checkmarx-vscode-extension:
788788
uuid: cf1213fd-8bfa-4a97-bf8b-937c93f31005
789789
name: Setting Up the Visual Studio Code Extension Plugin
790790
url: https://checkmarx.atlassian.net/wiki/spaces/SD/pages/1759216424/Setting+Up+the+Visual+Studio+Code+Extension+Plugin
791+
test-url-expects: [302]
791792
tags: [ide, sast]
792793
pre-commit-microsoft:
793794
uuid: 58ac9dea-b6c7-4698-904e-df89a9451c82
794795
name: DevSecOps control Pre-commit
795-
url: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#plan-and-develop
796+
url: https://learn.microsoft.com/en-us/security/zero-trust/develop/secure-devops-environments-zero-trust
796797
tags: [pre-commit]
797798
pre-commit-synopsis:
798799
uuid: 8da8d115-0f4e-40f0-a3ce-484a49e845fb
799800
name: Building your DevSecOps pipeline 5 essential activities
800-
url: https://www.synopsys.com/blogs/software-security/devsecops-pipeline-checklist/
801+
url: https://www.blackduck.com/blog/devsecops-pipeline-checklist/
801802
tags: [pre-commit]
802803
dependencyTrack:
803804
uuid: 500399bd-7dfc-47fd-99d8-b55cefb760a9
@@ -831,7 +832,7 @@ implementations:
831832
uuid: f011de6e-ab7c-4ec7-af55-03427271ab32
832833
name: Coverage.py
833834
tags: [testing, coverage]
834-
url: https://github.com/nedbat/coveragepy
835+
url: https://github.com/coveragepy/coveragepy
835836
description: |
836837
Code coverage measurement for Python
837838
github-dependabot:
@@ -888,6 +889,7 @@ implementations:
888889
name: terraform
889890
tags: [IaC]
890891
url: https://www.terraform.io/
892+
test-url-expects: [308]
891893
description: |
892894
Terraform enables infrastructure automation for provisioning, compliance, and management of any cloud, datacenter, and service.
893895
packj:
@@ -897,7 +899,7 @@ implementations:
897899
url: https://github.com/ossillate-inc/packj
898900
description: |
899901
Packj is a tool to detect software supply chain attacks. It can detect malicious, vulnerable, abandoned, typo-squatting, and other "risky" packages from popular open-source package registries, such as NPM, RubyGems, and PyPI.
900-
apiMyth:
902+
api-myths:
901903
uuid: 6150533e-58ca-4b52-a9b2-6226545d9ea0
902904
name: Top 5 API Security Myths That Are Crushing Your Business
903905
tags: [documentation, waf]

0 commit comments

Comments
 (0)