Skip to content

Commit 532bb72

Browse files
committed
feat: update SAMM mapping based on arams feedback
1 parent 05c7c59 commit 532bb72

File tree

11 files changed

+83
-115
lines changed

11 files changed

+83
-115
lines changed

src/assets/YAML/default/CultureAndOrganization/Process.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,8 @@ Culture and Organization:
7878
level: 1
7979
implementation: []
8080
references:
81-
samm2: []
81+
samm2:
82+
- O-IM-2-B
8283
iso27001-2017:
8384
- 17.1.1
8485
iso27001-2022:
@@ -110,7 +111,8 @@ Culture and Organization:
110111
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/defectdojo-client
111112
references:
112113
samm2:
113-
- I-DM-3-B
114+
- O-OM-2-A
115+
- G-PC-2-B
114116
iso27001-2022:
115117
- 5.25
116118
- 5.12

src/assets/YAML/default/Implementation/ApplicationHardening.yaml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Implementation:
4242
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/apimaturity
4343
references:
4444
samm2:
45-
- D-SR-1-A
45+
- D-SR-2-A
4646
iso27001-2017:
4747
- Hardening is not explicitly covered by ISO 27001 - too specific
4848
- 13.1.3
@@ -65,7 +65,7 @@ Implementation:
6565
<a href="{{bad_data}}">Click me</a>
6666
<script>var x = '{{bad_data}}';</script>
6767
<script>/** Comment {{bad_data}} */</script>
68-
```
68+
```
6969
risk:
7070
If an attacker manages to slip though your input validation, the attacker may gain control over the user session or execute arbitrary actions.
7171
measure: |
@@ -107,7 +107,7 @@ Implementation:
107107
Systems vulnerable to injections may lead to data breaches, loss of data,
108108
unauthorized alteration of data, or complete database compromise or downtime.
109109
110-
This applies to SQL, NoSql, LDAP, XPath, email headers OS commands, etc.
110+
This applies to SQL, NoSql, LDAP, XPath, email headers OS commands, etc.
111111
measure: |
112112
* Identify which of the types your application is using. Check that you use:
113113
* Use _parametrized queries_ (or _prepared statements_)
@@ -120,7 +120,7 @@ Implementation:
120120
resources: 1
121121
usefulness: 3
122122
level: 1
123-
implementation:
123+
implementation:
124124
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-parameterization-cheats
125125
references:
126126
samm2:
@@ -174,7 +174,7 @@ Implementation:
174174
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/apimaturity
175175
references:
176176
samm2:
177-
- D-SR-1-A
177+
- D-SR-3-A
178178
iso27001-2017:
179179
- Hardening is not explicitly covered by ISO 27001 - too specific
180180
- 13.1.3
@@ -204,7 +204,7 @@ Implementation:
204204
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-masvs
205205
references:
206206
samm2:
207-
- D-SR-2-A
207+
- D-SR-3-A
208208
iso27001-2017:
209209
- Hardening is not explicitly covered by ISO 27001 - too specific
210210
- 13.1.3
@@ -319,7 +319,7 @@ Implementation:
319319
- Referrer-Policy: Control information in the Referrer header
320320
references:
321321
samm2:
322-
- D-SR-3-A
322+
- O-EM-2-A
323323
iso27001-2017:
324324
- Hardening is not explicitly covered by ISO 27001 - too specific
325325
- 13.1.3
@@ -383,4 +383,4 @@ Implementation:
383383
- 13.1.3
384384
iso27001-2022:
385385
- Virtual environments are not explicitly covered by ISO 27001 - too specific
386-
- 8.22
386+
- 8.22

src/assets/YAML/default/Implementation/DevelopmentAndSourceControl.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,7 @@ Implementation:
102102
references:
103103
samm2:
104104
- O-EM-1-A
105+
- I-SB-A-2
105106
iso27001-2017:
106107
- Not explicitly covered by ISO 27001 - too specific
107108
- 12.1.1

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 25 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Implementation:
146146
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/firewalls
147147
references:
148148
samm2:
149-
- O-EM-1-A
149+
- O-EM-2-A
150150
iso27001-2017:
151151
- Virtual environments are not explicitly covered by ISO 27001 - too specific
152152
- 13.1.3
@@ -172,7 +172,7 @@ Implementation:
172172
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/remove-direct-access
173173
references:
174174
samm2:
175-
- O-EM-1-A
175+
- O-EM-2-A
176176
iso27001-2017:
177177
- Not explicitly covered by ISO 27001 - too specific
178178
- 17.2.1
@@ -205,7 +205,7 @@ Implementation:
205205
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/jenkinsfile
206206
references:
207207
samm2:
208-
- O-EM-1-A
208+
- O-EM-2-A
209209
iso27001-2017:
210210
- Not explicitly covered by ISO 27001 - too specific
211211
- 12.1.1
@@ -268,37 +268,14 @@ Implementation:
268268
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/falco
269269
references:
270270
samm2:
271-
- O-EM-1-A
271+
- O-EM-2-A
272272
iso27001-2017:
273273
- System hardening is not explicitly covered by ISO 27001 - too specific
274274
iso27001-2022:
275275
- ISO 27001:2022 mapping is missing
276276
isImplemented: false
277277
evidence: ""
278278
comments: ""
279-
Microservice-architecture:
280-
uuid: 118b869b-3850-456e-98d9-1abdb85cbc5a
281-
risk: Monolithic applications are hard to test.
282-
measure:
283-
A microservice-architecture helps to have small components, which are
284-
more easy to test.
285-
difficultyOfImplementation:
286-
knowledge: 4
287-
time: 5
288-
resources: 5
289-
usefulness: 1
290-
level: 5
291-
implementation: []
292-
references:
293-
samm2:
294-
- O-EM-1-A
295-
iso27001-2017:
296-
- Not explicitly covered by ISO 27001
297-
iso27001-2022:
298-
- ISO 27001:2022 mapping is missing
299-
isImplemented: false
300-
evidence: ""
301-
comments: ""
302279
Production near environments are used by developers:
303280
uuid: e14de741-94b3-447c-8b07-eea947d82e61
304281
risk:
@@ -322,7 +299,7 @@ Implementation:
322299
implementation: []
323300
references:
324301
samm2:
325-
- O-EM-1-A
302+
- O-EM-2-A
326303
iso27001-2017:
327304
- 12.1.4
328305
- 17.2.1
@@ -339,7 +316,7 @@ Implementation:
339316
or to modify information unauthorized on systems.
340317
measure:
341318
The usage of a (role based) access control helps to restrict system
342-
access to authorized users.
319+
access to authorized users. And enhancement is to use attribute based access control.
343320
difficultyOfImplementation:
344321
knowledge: 2
345322
time: 3
@@ -354,7 +331,7 @@ Implementation:
354331
- Defined build process
355332
references:
356333
samm2:
357-
- O-EM-1-A
334+
- O-EM-2-A
358335
iso27001-2017:
359336
- 9.4.1
360337
iso27001-2022:
@@ -444,7 +421,7 @@ Implementation:
444421
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/defend-the-core-kubernetes
445422
references:
446423
samm2:
447-
- O-EM-1-A
424+
- O-EM-2-A
448425
iso27001-2017:
449426
- Hardening is not explicitly covered by ISO 27001 - too specific
450427
- 13.1.3
@@ -473,7 +450,7 @@ Implementation:
473450
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/chaosmonkey
474451
references:
475452
samm2:
476-
- O-EM-1-A
453+
- O-EM-3-A
477454
iso27001-2017:
478455
- Not explicitly covered by ISO 27001 - too specific
479456
- 17.1.3
@@ -607,7 +584,7 @@ Implementation:
607584
- Defined build process
608585
references:
609586
samm2:
610-
- O-EM-1-A
587+
- O-EM-2-A
611588
iso27001-2017:
612589
- not explicitly covered by ISO 27001 - too specific
613590
iso27001-2022:
@@ -676,13 +653,15 @@ Implementation:
676653
- 8.14
677654
isImplemented: false
678655
evidence: ""
679-
comments: ""
656+
comments: ""
680657
WAF baseline:
681658
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
682659
risk:
683660
Vulnerable input, such as exploits, can infiltrate the application via numerous entry points, posing a significant security threat.
684661
measure:
685662
Implementing a web application firewall (WAF) is a critical security control. At a baseline level, the objective is to finely balance the reduction of false positives, maintaining user experience, against a potential increase in the less noticeable false negatives.
663+
664+
Begin with the WAF in a monitoring state to understand the traffic and threats. Progressively enforce blocking actions based on intelligence gathered, ensuring minimal disruption to legitimate traffic.
686665
description: |
687666
A baseline WAF configuration provides essential defense against common vulnerabilities, acting as a first line of automated threat detection and response.
688667
Steps:
@@ -699,27 +678,27 @@ Implementation:
699678
resources: 3
700679
usefulness: 3
701680
level: 3
702-
description: |
703-
Begin with the WAF in a monitoring state to understand the traffic and threats. Progressively enforce blocking actions based on intelligence gathered, ensuring minimal disruption to legitimate traffic.
704681
dependsOn:
705682
- Context-aware output encoding
706683
implementation: []
707684
references:
708685
samm2:
709-
- D-SR-3-A
686+
- O-EM-1-A
710687
iso27001-2017:
711688
- Hardening is not explicitly covered by ISO 27001 - too specific
712689
- 13.1.3
713690
iso27001-2022:
714691
- Hardening is not explicitly covered by ISO 27001 - too specific
715692
- 8.22
716-
comments:
693+
comments:
717694
WAF medium:
718695
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b-medium
719696
risk:
720697
The threat from malicious inputs remains high, with exploits seeking to exploit any vulnerabilities present at the various points of entry to the application.
721698
measure:
722699
A WAF deployed with a medium level of protection strengthens the security posture by striking a more advanced balance between the detection of genuine threats and the minimization of false alarms.
700+
701+
Maintain the WAF in alert mode initially to ensure a comprehensive understanding of potential threats. With a medium-level configuration, the WAF settings are refined for greater precision in threat detection, with a stronger emphasis on security without significantly impacting legitimate traffic.
723702
description: |
724703
A medium-level WAF configuration builds upon the baseline to offer a more nuanced and responsive defense mechanism against a wider array of threats.
725704
@@ -737,28 +716,28 @@ Implementation:
737716
resources: 4
738717
usefulness: 3
739718
level: 4
740-
description: |
741-
Maintain the WAF in alert mode initially to ensure a comprehensive understanding of potential threats. With a medium-level configuration, the WAF settings are refined for greater precision in threat detection, with a stronger emphasis on security without significantly impacting legitimate traffic.
742719
dependsOn:
743720
- WAF baseline
744721
implementation: []
745722
references:
746723
samm2:
747-
- D-SR-3-A
724+
- O-EM-2-A
748725
iso27001-2017:
749726
- Hardening is not explicitly covered by ISO 27001 - too specific
750727
- 13.1.3
751728
iso27001-2022:
752729
- Hardening is not explicitly covered by ISO 27001 - too specific
753730
- 8.22
754-
comments:
755-
731+
comments:
732+
756733
WAF Advanced:
757734
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b-advanced
758735
risk:
759736
The presence of sophisticated threats necessitates a robust defense strategy where application inputs are meticulously scrutinized for security breaches, including advanced persistent threats and zero-day vulnerabilities.
760737
measure:
761738
An advanced WAF protection level includes rigorous input validation, rejecting any parameters not explicitly required, and custom rule sets that are dynamically updated in response to emerging threats.
739+
740+
The advanced WAF setup is designed to ensure all data is in the correct format and any superfluous input parameters are automatically rejected. It includes machine learning algorithms to detect anomalies, custom-developed rules for real-time traffic analysis, and seamless integration with existing security infrastructures to adapt to the ever-changing threat landscape.
762741
description: |
763742
This advanced configuration goes beyond typical WAF implementations by enforcing strict input format checks and parameter validation to prevent any unauthorized or malformed data from compromising the application.
764743
@@ -780,22 +759,20 @@ Implementation:
780759
resources: 5
781760
usefulness: 4
782761
level: 5
783-
description: |
784-
The advanced WAF setup is designed to ensure all data is in the correct format and any superfluous input parameters are automatically rejected. It includes machine learning algorithms to detect anomalies, custom-developed rules for real-time traffic analysis, and seamless integration with existing security infrastructures to adapt to the ever-changing threat landscape.
785762
dependsOn:
786763
- WAF medium
787764
implementation: []
788765
references:
789766
samm2:
790-
- D-SR-3-A
767+
- O-EM-2-A
791768
iso27001-2017:
792769
- Hardening is not explicitly covered by ISO 27001 - too specific
793770
- 13.1.3
794771
iso27001-2022:
795772
- Hardening is not explicitly covered by ISO 27001 - too specific
796773
- 8.22
797-
comments:
798-
774+
comments:
775+
799776

800777

801778

src/assets/YAML/default/InformationGathering/Logging.yaml

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Information Gathering:
150150
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/bash
151151
references:
152152
samm2:
153-
- O-IM-1-A
153+
- O-OM-1-A
154154
iso27001-2017:
155155
- Not explicitly covered by ISO 27001 - too specific
156156
- 12.4.1
@@ -195,3 +195,22 @@ Information Gathering:
195195
isImplemented: false
196196
evidence: ""
197197
comments: ""
198+
Analyze logs:
199+
uuid: b217c8bb-5d61-4b41-a675-1083993f83b1
200+
risk: Not aware of attacks happening.
201+
measure: Check logs for keywords.
202+
difficultyOfImplementation:
203+
knowledge: 2
204+
time: 2
205+
resources: 2
206+
usefulness: 3
207+
level: 3
208+
implementation:
209+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sigmahq
210+
references:
211+
samm2:
212+
- O-IM-1-A
213+
iso27001-2017:
214+
- ISO 27001:2017 mapping is missing
215+
iso27001-2022:
216+
- ISO 27001:2022 mapping is missing

0 commit comments

Comments
 (0)