You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Not explicitly covered by ISO 27001 - too specific
479
456
- 17.1.3
@@ -607,7 +584,7 @@ Implementation:
607
584
- Defined build process
608
585
references:
609
586
samm2:
610
-
- O-EM-1-A
587
+
- O-EM-2-A
611
588
iso27001-2017:
612
589
- not explicitly covered by ISO 27001 - too specific
613
590
iso27001-2022:
@@ -676,13 +653,15 @@ Implementation:
676
653
- 8.14
677
654
isImplemented: false
678
655
evidence: ""
679
-
comments: ""
656
+
comments: ""
680
657
WAF baseline:
681
658
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
682
659
risk:
683
660
Vulnerable input, such as exploits, can infiltrate the application via numerous entry points, posing a significant security threat.
684
661
measure:
685
662
Implementing a web application firewall (WAF) is a critical security control. At a baseline level, the objective is to finely balance the reduction of false positives, maintaining user experience, against a potential increase in the less noticeable false negatives.
663
+
664
+
Begin with the WAF in a monitoring state to understand the traffic and threats. Progressively enforce blocking actions based on intelligence gathered, ensuring minimal disruption to legitimate traffic.
686
665
description: |
687
666
A baseline WAF configuration provides essential defense against common vulnerabilities, acting as a first line of automated threat detection and response.
688
667
Steps:
@@ -699,27 +678,27 @@ Implementation:
699
678
resources: 3
700
679
usefulness: 3
701
680
level: 3
702
-
description: |
703
-
Begin with the WAF in a monitoring state to understand the traffic and threats. Progressively enforce blocking actions based on intelligence gathered, ensuring minimal disruption to legitimate traffic.
704
681
dependsOn:
705
682
- Context-aware output encoding
706
683
implementation: []
707
684
references:
708
685
samm2:
709
-
- D-SR-3-A
686
+
- O-EM-1-A
710
687
iso27001-2017:
711
688
- Hardening is not explicitly covered by ISO 27001 - too specific
712
689
- 13.1.3
713
690
iso27001-2022:
714
691
- Hardening is not explicitly covered by ISO 27001 - too specific
715
692
- 8.22
716
-
comments:
693
+
comments:
717
694
WAF medium:
718
695
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b-medium
719
696
risk:
720
697
The threat from malicious inputs remains high, with exploits seeking to exploit any vulnerabilities present at the various points of entry to the application.
721
698
measure:
722
699
A WAF deployed with a medium level of protection strengthens the security posture by striking a more advanced balance between the detection of genuine threats and the minimization of false alarms.
700
+
701
+
Maintain the WAF in alert mode initially to ensure a comprehensive understanding of potential threats. With a medium-level configuration, the WAF settings are refined for greater precision in threat detection, with a stronger emphasis on security without significantly impacting legitimate traffic.
723
702
description: |
724
703
A medium-level WAF configuration builds upon the baseline to offer a more nuanced and responsive defense mechanism against a wider array of threats.
725
704
@@ -737,28 +716,28 @@ Implementation:
737
716
resources: 4
738
717
usefulness: 3
739
718
level: 4
740
-
description: |
741
-
Maintain the WAF in alert mode initially to ensure a comprehensive understanding of potential threats. With a medium-level configuration, the WAF settings are refined for greater precision in threat detection, with a stronger emphasis on security without significantly impacting legitimate traffic.
742
719
dependsOn:
743
720
- WAF baseline
744
721
implementation: []
745
722
references:
746
723
samm2:
747
-
- D-SR-3-A
724
+
- O-EM-2-A
748
725
iso27001-2017:
749
726
- Hardening is not explicitly covered by ISO 27001 - too specific
750
727
- 13.1.3
751
728
iso27001-2022:
752
729
- Hardening is not explicitly covered by ISO 27001 - too specific
The presence of sophisticated threats necessitates a robust defense strategy where application inputs are meticulously scrutinized for security breaches, including advanced persistent threats and zero-day vulnerabilities.
760
737
measure:
761
738
An advanced WAF protection level includes rigorous input validation, rejecting any parameters not explicitly required, and custom rule sets that are dynamically updated in response to emerging threats.
739
+
740
+
The advanced WAF setup is designed to ensure all data is in the correct format and any superfluous input parameters are automatically rejected. It includes machine learning algorithms to detect anomalies, custom-developed rules for real-time traffic analysis, and seamless integration with existing security infrastructures to adapt to the ever-changing threat landscape.
762
741
description: |
763
742
This advanced configuration goes beyond typical WAF implementations by enforcing strict input format checks and parameter validation to prevent any unauthorized or malformed data from compromising the application.
764
743
@@ -780,22 +759,20 @@ Implementation:
780
759
resources: 5
781
760
usefulness: 4
782
761
level: 5
783
-
description: |
784
-
The advanced WAF setup is designed to ensure all data is in the correct format and any superfluous input parameters are automatically rejected. It includes machine learning algorithms to detect anomalies, custom-developed rules for real-time traffic analysis, and seamless integration with existing security infrastructures to adapt to the ever-changing threat landscape.
785
762
dependsOn:
786
763
- WAF medium
787
764
implementation: []
788
765
references:
789
766
samm2:
790
-
- D-SR-3-A
767
+
- O-EM-2-A
791
768
iso27001-2017:
792
769
- Hardening is not explicitly covered by ISO 27001 - too specific
793
770
- 13.1.3
794
771
iso27001-2022:
795
772
- Hardening is not explicitly covered by ISO 27001 - too specific
0 commit comments