-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
14 changed files
with
67 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Security Automatisierung | ||
|
||
## Security Testing | ||
|
||
![Security Testing Pyramide](../99_assets/images/security_testing_pyramide.png) | ||
|
||
## Security Observability | ||
|
||
![SIEM](../99_assets/images/siem.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
# Security Culture | ||
|
||
|
||
## Security Champions | ||
|
||
![Security Champions](../99_assets/images/security_champions.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
# Security (in DevOps) | ||
|
||
![Secure Software Development Lifecycle](../99_assets/images/secure_software_development_lifecycle.png) | ||
|
||
## Anforderungen für Security | ||
|
||
|
||
### Threat Modeling | ||
|
||
Mittels der Bedrohungsmodellierung (Threat Modeling) können frühzeitig potenzielle Bedrohungen, wie Schwachstellen oder die Möglichkeit von Angriffen, gegen ein System oder eine Anwendung systematisch identifiziert und bewertet werden. Ziel ist es, diese Bedrohungen zu verstehen um Maßnahmen zu ergreifen, die das Risiko von Sicherheitsverletzungen verringern. | ||
|
||
Die Bedrohungsmodellierung wird in de nachfolgend beschriebenen Schritten durchgeführt: | ||
|
||
1. __Erstellung eines Abbilds über das System__ (_What are we working on?_): | ||
Mit Hilfe geeigneter Diagramme wie z.B. mit einem Datenflussdiagram wird visualisiert, wie das System aufgebaut ist und wie Daten über diverse Übertragungsprotokolle durch das System fließen. | ||
2. __Identifikation von Bedrohungen und Schwachstellen__ (_What can go wrong?_): | ||
Auf Basis des Systemabbilds werden im zweiten Schritt potenzielle Bedrohungen und Schwachstellen ermittelt. Dies erfolgt mit unterschiedlichen Methoden wie z.B. der [STRIDE]() Methode. | ||
3. __Definition und Umsetzung von Gegenmaßnahmen und Strategien zum Umgang mit den Bedrohungen und Schwachstellen__ (_What are we going to do about it?_): | ||
Für jede der gefundenen Bedrohungen und Schwachstellen müssen dann Sicherheitsmassnahmen definiert und umgesetzt werden um die damit verbundenen Risiken zu mindern. | ||
4. __Retrospektive__ (_Did we do a good enough job?_): | ||
Im letzten Schritt wird geprüft, ob das Threat Model vollständig ist und alle wesentlichen Risiken erkannt und behandelt wurden. Darüber hinaus wird laufend die Effizienz des Threat Modeling Prozesses überprüft. | ||
|
||
### Application Security Verification Standard | ||
|
||
![ASVS](../99_assets/images/asvs.png) | ||
|
||
|
||
## Sichere Architektur und Designprinzipien | ||
|
||
![Secure Software Development Lifecycle](../99_assets/images/architecture_clean_code.png) | ||
|
||
## Secure Coding | ||
|
||
### Referenzen und weiterführende Links | ||
|
||
- [Threat Modeling Manifesto](https://www.threatmodelingmanifesto.org/) | ||
- [OWASP ASVS](https://github.com/OWASP/ASVS) | ||
- [CALMS: The DevOps Culture Model](https://www.atlassian.com/devops) |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
# Security | ||
|
||
- [Security (in DevOps)](./1_theorie/ÜbersichtSecInDevOps.md) | ||
- [Security Automatisierung](./1_theorie/SecurityAutomatisierung.md) | ||
- [Security Culture](./1_theorie/SecurityKultur.md) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters