You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/Implementation/ApplicationHardening.yaml
+5-4Lines changed: 5 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -49,14 +49,16 @@ Implementation:
49
49
iso27001-2022:
50
50
- Hardening is not explicitly covered by ISO 27001 - too specific
51
51
- 8.22
52
-
isImplemented: false
53
52
comments: ""
54
53
Contextualized Encoding:
55
54
uuid: e1f37abb-d848-4a3a-b3df-65e91a89dcb7
56
55
risk:
57
56
The generation of interpreter directives from user-provided data poses difficulties and can introduce vulnerabilities to injection attacks.
58
57
measure: |
59
-
Implementing contextualized encoding, such as employing object-relational mapping tools or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
58
+
Implementing contextualized encoding fpr the next interpreter, such as employing object-relational mapping tools
59
+
or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
60
+
61
+
Also take into account a a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
60
62
difficultyOfImplementation:
61
63
knowledge: 2
62
64
time: 2
@@ -75,6 +77,7 @@ Implementation:
75
77
iso27001-2022:
76
78
- Hardening is not explicitly covered by ISO 27001 - too specific
77
79
- 8.22
80
+
comments: ""
78
81
App. Hardening Level 1:
79
82
uuid: cf819225-30cb-4702-8e32-60225eedc33d
80
83
risk:
@@ -155,7 +158,6 @@ Implementation:
155
158
- Hardening is not explicitly covered by ISO 27001 - too specific
156
159
- 8.22
157
160
isImplemented: false
158
-
evidence: ""
159
161
comments: ""
160
162
dependsOn:
161
163
- App. Hardening Level 1
@@ -189,7 +191,6 @@ Implementation:
189
191
- Hardening is not explicitly covered by ISO 27001 - too specific
Copy file name to clipboardExpand all lines: src/assets/YAML/default/InformationGathering/Monitoring.yaml
+13-7Lines changed: 13 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -291,15 +291,23 @@ Information Gathering:
291
291
iso27001-2022:
292
292
- Not explicitly covered by ISO 27001 - too specific
293
293
- 5.26
294
-
isImplemented: false
295
-
evidence: ""
296
294
comments: ""
297
295
Simple application metrics:
298
296
uuid: e9a6d403-a467-445e-b98a-74f0c29da0b1
299
297
risk: Attacks on an application are not recognized.
300
-
measure:
301
-
Gathering of application metrics helps to identify incidents like brute
302
-
force attacks, login/logout.
298
+
measure: |-
299
+
Gathering of application metrics helps to identify incidents like brute force attacks, login/logout patterns, and unusual spikes in activity. Key metrics to monitor include:
By monitoring these basic metrics, teams can quickly investigate abnormal patterns and determine if they represent security incidents requiring response.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/Consolidation.yaml
+17-38Lines changed: 17 additions & 38 deletions
Original file line number
Diff line number
Diff line change
@@ -39,35 +39,6 @@ Test and Verification:
39
39
- 5.13
40
40
- 5.10
41
41
tags: ["vuln-action", "defect-management"]
42
-
Fix based on severity:
43
-
uuid: 38d1bd10-7b5f-4ae1-868c-0ec813285425
44
-
risk: |-
45
-
Overwhelming volume of security findings from automated testing tools. This might lead to ignorance of findings.
46
-
measure: |
47
-
Implement a very simple risk-based prioritization framework for vulnerability remediation based on the severity of the findings.
48
-
49
-
On level one, fix only critical findings.
50
-
difficultyOfImplementation:
51
-
knowledge: 2
52
-
time: 2
53
-
resources: 1
54
-
usefulness: 3
55
-
level: 1
56
-
implementation:
57
-
references:
58
-
samm2:
59
-
- I-DM-3-B
60
-
iso27001-2017:
61
-
- 16.1.4
62
-
- 8.2.1
63
-
- 8.2.2
64
-
- 8.2.3
65
-
iso27001-2022:
66
-
- 5.25
67
-
- 5.12
68
-
- 5.13
69
-
- 5.10
70
-
tags: ["vuln-action", "defect-management"]
71
42
Advanced visualization of defects:
72
43
uuid: 7a82020c-94d1-471c-bbd3-5f7fe7df4876
73
44
risk:
@@ -168,11 +139,19 @@ Test and Verification:
168
139
uuid: c1acc8af-312e-4503-a817-a26220c993a0
169
140
risk:
170
141
As false positive occur during each test, all vulnerabilities might be
171
-
ignored.
172
-
measure:
173
-
False positives are suppressed so they will not show up on the next
174
-
tests again. Most security tools have the possibility to suppress false positives.
175
-
A Vulnerability Management System might be used.
142
+
ignored. Specially, if tests are automated an run daily.
143
+
measure: |-
144
+
Findings from security tests must be triaged and outcomes persistend/documented to:
145
+
- Prevent re-analysis of known issues in subsequent test runs
146
+
- Track accepted risks vs false positives
147
+
- Enable consistent decision-making across teams
148
+
149
+
At this maturity level, a simple tracking system suffices - tools need only distinguish between "triaged" and "untriaged" findings, without complex categorization. Some tools refer to this as "suppression" of findings.
0 commit comments