You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/BuildandDeployment.yml
+17-7Lines changed: 17 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -264,7 +264,7 @@ Deployment:
264
264
Patch Management:
265
265
A patch policy is defined:
266
266
risk: Vulnerabilities in running containers stay for long and might get exploited.
267
-
measure: A patch policy for all artifacts (e.g. in images) is defined. How often is an images getting build?
267
+
measure: A patch policy for all artifacts (e.g. in images) is defined. How often is an image rebuilt?
268
268
difficultyOfImplementation:
269
269
knowledge: 3
270
270
time: 1
@@ -278,7 +278,7 @@ Patch Management:
278
278
- 14.2.5
279
279
Nightly build of images:
280
280
risk: Vulnerabilities in running containers stay for too long and might get exploited.
281
-
measure: Images are getting build at least nightly.
281
+
measure: Images are built at least nightly.
282
282
difficultyOfImplementation:
283
283
knowledge: 3
284
284
time: 2
@@ -290,7 +290,12 @@ Patch Management:
290
290
- 12.6.1
291
291
Automated PRs for patches:
292
292
risk: Known vulnerabilities components might stay for long and get exploited, even when a patch is available.
293
-
measure: Fast patching of third party component is needed. The DevOps way is to have an automated pull request for new components. This includes <ul><li>Applications</li><li>Virutalized operating system components (e.g. container images)</li><li>Operating Systems</li><li>Infrastructure as Code/GitOps (e.g. argocd)</li></ul>
293
+
measure: >-
294
+
Fast patching of third party component is needed. The DevOps way is to have an automated pull request for new components.
295
+
This includes <ul>
296
+
<li>Applications</li><li>Virutalized operating system components (e.g. container images)</li>
297
+
<li>Operating Systems</li><li>Infrastructure as Code/GitOps (e.g. argocd)</li>
risk: Vulnerabilities in images of running containers stay for too long and might get exploited. Long running containers have potential memory leaks. A compromised container might get killed by restarting the container (e.g. in case the attacker has not reached the persistence layer).
309
-
measure: The periodically builded images are deployed minimum every 30 days (better hourly/daily/weekly). Meaning an image is not in production for longer than 30 days.
313
+
risk: >-
314
+
Vulnerabilities in images of running containers stay for too long and might get exploited.
315
+
Long running containers have potential memory leaks.
316
+
A compromised container might get killed by restarting the container (e.g. in case the attacker has not reached the persistence layer).
317
+
measure: The periodically built images are deployed minimum every 30 days (better hourly/daily/weekly). Meaning an image is not in production for longer than 30 days.
310
318
difficultyOfImplementation:
311
319
knowledge: 3
312
320
time: 4
@@ -318,7 +326,7 @@ Patch Management:
318
326
- 12.6.1
319
327
Usage of a short maximum lifetime for images:
320
328
risk: Vulnerabilities in running containers stay for too long and might get exploited.
321
-
measure: The nightly builded images are deployed minimum every 1 day.
329
+
measure: Nightly built images are deployed at minimum every 1 day.
322
330
difficultyOfImplementation:
323
331
knowledge: 3
324
332
time: 4
@@ -332,7 +340,9 @@ Patch Management:
332
340
- Sample concept:<br/>(1) each container has a set lifetime and is killed / replaced with a new container multiple times a day where you have some form of a graceful replacement to ensure no (short) service outage will occur to the end users.<br/>(2) twice a day a rebuild of images is done. The rebuilds are put into a automated testing pipeline. If the testing has no blocking issues the new images will be released for deployment during the next "restart" of a container. What has to be done, is to ensure the new containers are deployed in some canary deployment manner, this will ensure that if (and only if) something buggy has been introduced which breaks functionality the canary deployment will make sure the "older version" is being used and not the buggy newer one.
333
341
Reduction of the attack surface:
334
342
risk: Components, dependencies, files or file access rights might have vulnerabilities, but the they are not needed.
335
-
measure: Removal of not needed components, dependencies, files or file access rights. For container images the usage of distroless images is recommended.
343
+
measure: >-
344
+
Removal of unneeded components, dependencies, files or file access rights.
345
+
For container images the usage of distroless images is recommended.
0 commit comments