Skip to content

Commit 2bc6246

Browse files
committed
feat: enhance descriptions
1 parent d6e57cb commit 2bc6246

File tree

7 files changed

+51
-61
lines changed

7 files changed

+51
-61
lines changed

src/assets/YAML/default/BuildAndDeployment/Build.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,7 @@ Build and Deployment:
4848
A well defined build process lowers the possibility of errors during
4949
the build process.
5050
description: |
51-
Sample evidence as an attribute in the yaml: The build process is defined in [REPLACE-ME Pipeline](https://replace-me/jenkins/job)
52-
in the folder _vars_. Projects are using a _Jenkinsfile_ to use the
53-
defined process.
51+
A build process can be defined in code, for example in a `Jenkinsfile`.
5452
difficultyOfImplementation:
5553
knowledge: 2
5654
time: 3

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,14 +49,16 @@ Implementation:
4949
iso27001-2022:
5050
- Hardening is not explicitly covered by ISO 27001 - too specific
5151
- 8.22
52-
isImplemented: false
5352
comments: ""
5453
Contextualized Encoding:
5554
uuid: e1f37abb-d848-4a3a-b3df-65e91a89dcb7
5655
risk:
5756
The generation of interpreter directives from user-provided data poses difficulties and can introduce vulnerabilities to injection attacks.
5857
measure: |
59-
Implementing contextualized encoding, such as employing object-relational mapping tools or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
58+
Implementing contextualized encoding fpr the next interpreter, such as employing object-relational mapping tools
59+
or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
60+
61+
Also take into account a a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
6062
difficultyOfImplementation:
6163
knowledge: 2
6264
time: 2
@@ -75,6 +77,7 @@ Implementation:
7577
iso27001-2022:
7678
- Hardening is not explicitly covered by ISO 27001 - too specific
7779
- 8.22
80+
comments: ""
7881
App. Hardening Level 1:
7982
uuid: cf819225-30cb-4702-8e32-60225eedc33d
8083
risk:
@@ -155,7 +158,6 @@ Implementation:
155158
- Hardening is not explicitly covered by ISO 27001 - too specific
156159
- 8.22
157160
isImplemented: false
158-
evidence: ""
159161
comments: ""
160162
dependsOn:
161163
- App. Hardening Level 1
@@ -189,7 +191,6 @@ Implementation:
189191
- Hardening is not explicitly covered by ISO 27001 - too specific
190192
- 8.22
191193
isImplemented: false
192-
evidence: ""
193194
comments: ""
194195
dependsOn:
195196
- App. Hardening Level 2 (75%)

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -511,9 +511,11 @@ Implementation:
511511
risk:
512512
Evil actors might be able to perform a man in the middle attack and sniff
513513
confidential information (e.g. authentication factors like passwords)
514-
measure:
514+
measure: |-
515515
By using encryption at the edge of traffic in transit, it is impossible
516-
or at least harder to sniff credentials being outside of the organization.
516+
or at least harder to sniff credentials or information being outside of the organization.
517+
518+
Useage of standard protocols like HTTPS is recommended.
517519
difficultyOfImplementation:
518520
knowledge: 2
519521
time: 2

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -291,15 +291,23 @@ Information Gathering:
291291
iso27001-2022:
292292
- Not explicitly covered by ISO 27001 - too specific
293293
- 5.26
294-
isImplemented: false
295-
evidence: ""
296294
comments: ""
297295
Simple application metrics:
298296
uuid: e9a6d403-a467-445e-b98a-74f0c29da0b1
299297
risk: Attacks on an application are not recognized.
300-
measure:
301-
Gathering of application metrics helps to identify incidents like brute
302-
force attacks, login/logout.
298+
measure: |-
299+
Gathering of application metrics helps to identify incidents like brute force attacks, login/logout patterns, and unusual spikes in activity. Key metrics to monitor include:
300+
- Authentication attempts (successful/failed logins)
301+
- Transaction volumes and patterns (e.g. orders, payments)
302+
- API call rates and response times
303+
- User session metrics
304+
- Resource utilization
305+
306+
Example: An e-commerce application normally processes 100 orders per hour. A sudden spike to 1000 orders per hour could indicate either:
307+
- A legitimate event (unannounced marketing campaign, viral social media post)
308+
- A security incident (automated bulk purchase bots, credential stuffing attack)
309+
310+
By monitoring these basic metrics, teams can quickly investigate abnormal patterns and determine if they represent security incidents requiring response.
303311
difficultyOfImplementation:
304312
knowledge: 2
305313
time: 2
@@ -315,8 +323,6 @@ Information Gathering:
315323
- 12.4.1
316324
iso27001-2022:
317325
- 8.15
318-
isImplemented: false
319-
evidence: ""
320326
comments: ""
321327
Simple budget metrics:
322328
uuid: f08a3219-6941-43ec-8762-4aff739f4664

src/assets/YAML/default/TestAndVerification/Consolidation.yaml

Lines changed: 17 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -39,35 +39,6 @@ Test and Verification:
3939
- 5.13
4040
- 5.10
4141
tags: ["vuln-action", "defect-management"]
42-
Fix based on severity:
43-
uuid: 38d1bd10-7b5f-4ae1-868c-0ec813285425
44-
risk: |-
45-
Overwhelming volume of security findings from automated testing tools. This might lead to ignorance of findings.
46-
measure: |
47-
Implement a very simple risk-based prioritization framework for vulnerability remediation based on the severity of the findings.
48-
49-
On level one, fix only critical findings.
50-
difficultyOfImplementation:
51-
knowledge: 2
52-
time: 2
53-
resources: 1
54-
usefulness: 3
55-
level: 1
56-
implementation:
57-
references:
58-
samm2:
59-
- I-DM-3-B
60-
iso27001-2017:
61-
- 16.1.4
62-
- 8.2.1
63-
- 8.2.2
64-
- 8.2.3
65-
iso27001-2022:
66-
- 5.25
67-
- 5.12
68-
- 5.13
69-
- 5.10
70-
tags: ["vuln-action", "defect-management"]
7142
Advanced visualization of defects:
7243
uuid: 7a82020c-94d1-471c-bbd3-5f7fe7df4876
7344
risk:
@@ -168,11 +139,19 @@ Test and Verification:
168139
uuid: c1acc8af-312e-4503-a817-a26220c993a0
169140
risk:
170141
As false positive occur during each test, all vulnerabilities might be
171-
ignored.
172-
measure:
173-
False positives are suppressed so they will not show up on the next
174-
tests again. Most security tools have the possibility to suppress false positives.
175-
A Vulnerability Management System might be used.
142+
ignored. Specially, if tests are automated an run daily.
143+
measure: |-
144+
Findings from security tests must be triaged and outcomes persistend/documented to:
145+
- Prevent re-analysis of known issues in subsequent test runs
146+
- Track accepted risks vs false positives
147+
- Enable consistent decision-making across teams
148+
149+
At this maturity level, a simple tracking system suffices - tools need only distinguish between "triaged" and "untriaged" findings, without complex categorization. Some tools refer to this as "suppression" of findings.
150+
151+
Samples for false positive handling:
152+
- [OWASP Dependency Check](https://jeremylong.github.io/DependencyCheck/general/suppression.html)
153+
- [Kubescape with VEX](https://kubescape.io/blog/2023/12/07/kubescape-support-for-vex-generation/)
154+
- [OWASP DefectDojo Risk Acceptance](https://docs.defectdojo.com/en/working_with_findings/findings_workflows/risk_acceptances/) and [False Positive Handling]
176155
difficultyOfImplementation:
177156
knowledge: 1
178157
time: 1
@@ -248,9 +227,8 @@ Test and Verification:
248227
iso27001-2022:
249228
- 8.8
250229
- 5.25
251-
isImplemented: false
252-
evidence: ""
253-
comments: ""
230+
tags: ["vuln-action", "defect-management"]
231+
comments: ""#
254232
Treatment of defects with severity high or higher:
255233
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
256234
risk: Vulnerabilities with severity high or higher are not visible.
@@ -274,7 +252,7 @@ Test and Verification:
274252
- 8.8
275253
- 5.25
276254
implementation: []
277-
isImplemented: false
255+
tags: ["vuln-action", "defect-management"]
278256
evidence: ""
279257
Treatment of defects with severity middle:
280258
uuid: 9cac3341-fe83-4079-bef2-bfc4279eb594
@@ -297,6 +275,7 @@ Test and Verification:
297275
- 8.8
298276
- 5.25
299277
implementation: []
278+
tags: ["vuln-action", "defect-management"]
300279
Usage of a vulnerability management system:
301280
uuid: 85ba5623-84be-4219-8892-808837be582d
302281
risk:

src/assets/YAML/default/TestAndVerification/Test-Intensity.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Test and Verification:
7070
risk:
7171
Time pressure and ignorance might lead to false predictions for the test
7272
intensity.
73-
measure: The intensity of the used tools are not modified to safe time.
73+
measure: The intensity of the used tools are not modified to save time.
7474
difficultyOfImplementation:
7575
knowledge: 1
7676
time: 1

src/assets/YAML/schemas/dsomm-schema-implementation.json

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -135,11 +135,17 @@
135135
"iso27001-2022"
136136
]
137137
},
138-
"isImplemented": {
139-
"type": "boolean"
138+
"teamsImplemented": {
139+
"type": "array",
140+
"items": {
141+
"type": "object"
142+
}
140143
},
141-
"evidence": {
142-
"type": "string"
144+
"teamsEvidence": {
145+
"type": "array",
146+
"items": {
147+
"type": "object"
148+
}
143149
},
144150
"comments": {
145151
"type": "string"
@@ -155,8 +161,6 @@
155161
"level",
156162
"implementation",
157163
"references",
158-
"isImplemented",
159-
"evidence",
160164
"comments"
161165
],
162166
"additionalProperties": false

0 commit comments

Comments
 (0)