Skip to content

Commit 2a1658f

Browse files
committed
Add application hardening
1 parent f211ad7 commit 2a1658f

File tree

6 files changed

+93
-9
lines changed

6 files changed

+93
-9
lines changed
File renamed without changes.

data-yml.php

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,11 @@ function readYaml($file) {
1010
}
1111

1212
$dimensions = array(
13+
"Application" => readYaml("data/Application.yml"),
1314
"Culture and Org." => readYaml("data/CultureAndOrg.yml"),
1415
"Build and Deployment" => readYaml("data/BuildAndDeployment.yml"),
1516
"Information Gathering" => readYaml("data/InformationGathering.yml"),
16-
"Infrastructure" => readYaml("data/Infrastructure.yml"),
17+
"Hardening" => readYaml("data/Hardening.yml"),
1718
"Test and Verification" => readYaml("data/TestAndVerification.yml"),
1819
);
1920

data.php

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,11 @@ function readYaml($file) {
1010
}
1111

1212
$dimensions = array(
13+
"Application" => readYaml("data/Application.yml"),
1314
"Culture and Org." => readYaml("data/CultureandOrg.yml"),
1415
"Build and Deployment" => readYaml("data/BuildandDeployment.yml"),
1516
"Information Gathering" => readYaml("data/Informationgathering.yml"),
16-
"Infrastructure" => readYaml("data/Infrastructure.yml"),
17+
"Hardening" => readYaml("data/Hardening.yml"),
1718
"Test and Verification" => readYaml("data/TestandVerification.yml")
1819
);
1920

data/Infrastructure.yml renamed to data/Hardening.yml

Lines changed: 69 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Infrastructure Hardening:
6363
iso27001-2017:
6464
- virtual environments are not explicitly covered by ISO 27001 - too specific
6565
- 13.1.3
66-
Filter for outcoing traffic:
66+
Filter outcoing traffic:
6767
risk: A compromised infrastructure component might try to send out stolen data.
6868
measure: Having a whitelist and explizitly allowing egress traffic provides the ability to stop unauthorized data leackage.
6969
difficultyOfImplementation:
@@ -284,4 +284,72 @@ Infrastructure Hardening:
284284
- 12.1.3
285285
- 13.1.3
286286
- 17.2.1
287+
Application Hardening:
288+
Application Hardening Level 1:
289+
risk: Using an insecure application might lead to a compromised application. This might lead to total data theft or data modification.
290+
measure: |
291+
Following frameworks like the
292+
<ul>
293+
<li>OWASP Application Security Verification Standard Level 1</li>
294+
<li>OWASP Mobile Application Security Verification Standard Level 1</li>
295+
</ul>
296+
297+
in all applications provides a good baseline.
298+
difficultyOfImplementation:
299+
knowledge: 4
300+
time: 4
301+
resources: 2
302+
usefulness: 4
303+
level: 1
304+
implementation:
305+
- <a href='https://owasp.org/www-project-application-security-verification-standard/'>OWASP ASVS</a>
306+
- <a href="https://github.com/OWASP/owasp-masvs">OWASP MASVS</a>
307+
samm2: software-requirements|A|1
308+
iso27001-2017:
309+
- hardening is not explicitly covered by ISO 27001 - too specific
310+
- 13.1.3
311+
312+
Application Hardening Level 2:
313+
risk: Using an insecure application might lead to a compromised application. This might lead to total data theft or data modification.
314+
measure: |
315+
Following frameworks like the
316+
<ul>
317+
<li>OWASP Application Security Verification Standard Level 2</li>
318+
<li>OWASP Mobile Application Security Verification Standard Level 2</li>
319+
</ul>
320+
difficultyOfImplementation:
321+
knowledge: 4
322+
time: 4
323+
resources: 2
324+
usefulness: 4
325+
level: 2
326+
implementation:
327+
- <a href='https://owasp.org/www-project-application-security-verification-standard/'>OWASP ASVS</a>
328+
- <a href="https://github.com/OWASP/owasp-masvs">OWASP MASVS</a>
329+
samm2: software-requirements|A|2
330+
iso27001-2017:
331+
- hardening is not explicitly covered by ISO 27001 - too specific
332+
- 13.1.3
333+
334+
Application Hardening Level 3:
335+
risk: Using an insecure application might lead to a compromised application. This might lead to total data theft or data modification.
336+
measure: |
337+
Following frameworks like the
338+
<ul>
339+
<li>OWASP Application Security Verification Standard Level 3</li>
340+
<li>OWASP Mobile Application Security Verification Standard Maturity Requirements</li>
341+
</ul>
342+
difficultyOfImplementation:
343+
knowledge: 4
344+
time: 4
345+
resources: 2
346+
usefulness: 4
347+
level: 4
348+
implementation:
349+
- <a href='https://owasp.org/www-project-application-security-verification-standard/'>OWASP ASVS</a>
350+
- <a href="https://github.com/OWASP/owasp-masvs">OWASP MASVS</a>
351+
samm2: software-requirements|A|3
352+
iso27001-2017:
353+
- hardening is not explicitly covered by ISO 27001 - too specific
354+
- 13.1.3
287355
...

data/Informationgathering.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,8 @@ Monitoring:
3232
- 12.6.1
3333
Alerting:
3434
risk: Incidents are discovered after they happend.
35-
measure: Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
35+
measure: |
36+
Thresholds for metrics are set. In case the thresholds are reached, alarms are send out. Which should get attention due to the critically.
3637
difficultyOfImplementation:
3738
knowledge: 2
3839
time: 5
@@ -79,7 +80,9 @@ Monitoring:
7980
- 12.1.3
8081
Defence metrics:
8182
risk: IDS/IPS systems like packet- or application-firewalls detect and prevent attacks. It is not known how many attacks has been detected and blocked.
82-
measure: Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
83+
measure: |
84+
Gathering of defence metrics like TCP/UDP sources enables to assume the geographic location of the request.
85+
Assuming a Kubernetes cluster with an egress-traffic filter (e.g. IP/domain based), an alert might be send out in case of every violation. For ingress-traffic, alerting might not even be considered.
8386
difficultyOfImplementation:
8487
knowledge: 3
8588
time: 5
@@ -88,6 +91,7 @@ Monitoring:
8891
level: 4
8992
dependsOn:
9093
- Visualized metrics
94+
- Filter outcoing traffic
9195
samm2: o-incident-management|A|2
9296
iso27001-2017:
9397
- 12.4.1

js/example.js

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ function loadDiagramm() {
1414
});
1515
});
1616
});
17-
var countSubdimensions = 16;
17+
var countSubdimensions = 17;
1818
var chart = circularHeatChart()
19-
.segmentHeight(50)
20-
.innerRadius(190)
19+
.segmentHeight(40)
20+
.innerRadius(170)
2121
.numSegments(countSubdimensions)
2222
.radialLabels(["Maturity 1", "Maturity 2", "Maturity 3", "Maturity 4"])
2323
.segmentLabels(labels)
@@ -33,5 +33,15 @@ function loadDiagramm() {
3333
$('html,body').scrollTop(0);
3434
}
3535
function replaceSubdimensionName(name) {
36-
return name.replace("for applications", "app").replace("Hardening", "Hard.").replace("Guidance", "Guid.").replace("for infrastructure", "infra")
36+
return name
37+
.replace("for applications", "app")
38+
.replace("Hardening", "Hard.")
39+
.replace("Guidance", "Guid.")
40+
.replace("for infrastructure", "infra")
41+
.replace("Dynamic", "Dyn.")
42+
.replace("Infrastructure", "Infra.")
43+
.replace("Application", "App.")
44+
.replace("Education", "Edu.")
45+
.replace("Management", "Education.")
46+
;
3747
}

0 commit comments

Comments
 (0)