Skip to content

Commit e4bf080

Browse files
authored
Merge pull request #37 from ioggstream/ioggstream-editorial
Typos and editorial.
2 parents ff9429c + 59921a5 commit e4bf080

File tree

1 file changed

+17
-7
lines changed

1 file changed

+17
-7
lines changed

data/BuildandDeployment.yml

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ Deployment:
264264
Patch Management:
265265
A patch policy is defined:
266266
risk: Vulnerabilities in running containers stay for long and might get exploited.
267-
measure: A patch policy for all artifacts (e.g. in images) is defined. How often is an images getting build?
267+
measure: A patch policy for all artifacts (e.g. in images) is defined. How often is an image rebuilt?
268268
difficultyOfImplementation:
269269
knowledge: 3
270270
time: 1
@@ -278,7 +278,7 @@ Patch Management:
278278
- 14.2.5
279279
Nightly build of images:
280280
risk: Vulnerabilities in running containers stay for too long and might get exploited.
281-
measure: Images are getting build at least nightly.
281+
measure: Images are built at least nightly.
282282
difficultyOfImplementation:
283283
knowledge: 3
284284
time: 2
@@ -290,7 +290,12 @@ Patch Management:
290290
- 12.6.1
291291
Automated PRs for patches:
292292
risk: Known vulnerabilities components might stay for long and get exploited, even when a patch is available.
293-
measure: Fast patching of third party component is needed. The DevOps way is to have an automated pull request for new components. This includes <ul><li>Applications</li><li>Virutalized operating system components (e.g. container images)</li><li>Operating Systems</li><li>Infrastructure as Code/GitOps (e.g. argocd)</li></ul>
293+
measure: >-
294+
Fast patching of third party component is needed. The DevOps way is to have an automated pull request for new components.
295+
This includes <ul>
296+
<li>Applications</li><li>Virutalized operating system components (e.g. container images)</li>
297+
<li>Operating Systems</li><li>Infrastructure as Code/GitOps (e.g. argocd)</li>
298+
</ul>
294299
difficultyOfImplementation:
295300
knowledge: 2
296301
time: 2
@@ -305,8 +310,11 @@ Patch Management:
305310
- <a href="https://dependabot.com/">dependabot</a>
306311
- Jenkins
307312
Usage of a maximum lifetime for images:
308-
risk: Vulnerabilities in images of running containers stay for too long and might get exploited. Long running containers have potential memory leaks. A compromised container might get killed by restarting the container (e.g. in case the attacker has not reached the persistence layer).
309-
measure: The periodically builded images are deployed minimum every 30 days (better hourly/daily/weekly). Meaning an image is not in production for longer than 30 days.
313+
risk: >-
314+
Vulnerabilities in images of running containers stay for too long and might get exploited.
315+
Long running containers have potential memory leaks.
316+
A compromised container might get killed by restarting the container (e.g. in case the attacker has not reached the persistence layer).
317+
measure: The periodically built images are deployed minimum every 30 days (better hourly/daily/weekly). Meaning an image is not in production for longer than 30 days.
310318
difficultyOfImplementation:
311319
knowledge: 3
312320
time: 4
@@ -318,7 +326,7 @@ Patch Management:
318326
- 12.6.1
319327
Usage of a short maximum lifetime for images:
320328
risk: Vulnerabilities in running containers stay for too long and might get exploited.
321-
measure: The nightly builded images are deployed minimum every 1 day.
329+
measure: Nightly built images are deployed at minimum every 1 day.
322330
difficultyOfImplementation:
323331
knowledge: 3
324332
time: 4
@@ -332,7 +340,9 @@ Patch Management:
332340
- Sample concept:<br/>(1) each container has a set lifetime and is killed / replaced with a new container multiple times a day where you have some form of a graceful replacement to ensure no (short) service outage will occur to the end users.<br/>(2) twice a day a rebuild of images is done. The rebuilds are put into a automated testing pipeline. If the testing has no blocking issues the new images will be released for deployment during the next "restart" of a container. What has to be done, is to ensure the new containers are deployed in some canary deployment manner, this will ensure that if (and only if) something buggy has been introduced which breaks functionality the canary deployment will make sure the "older version" is being used and not the buggy newer one.
333341
Reduction of the attack surface:
334342
risk: Components, dependencies, files or file access rights might have vulnerabilities, but the they are not needed.
335-
measure: Removal of not needed components, dependencies, files or file access rights. For container images the usage of distroless images is recommended.
343+
measure: >-
344+
Removal of unneeded components, dependencies, files or file access rights.
345+
For container images the usage of distroless images is recommended.
336346
difficultyOfImplementation:
337347
knowledge: 3
338348
time: 3

0 commit comments

Comments
 (0)