Skip to content

Latest commit

 

History

History
80 lines (40 loc) · 3.25 KB

SecurityRisks.md

File metadata and controls

80 lines (40 loc) · 3.25 KB

Security Risks

Weak Github Password

The attacker uses a brute force attack to discover a username/password combination for Github.

Response Classifiction: Mitigate

Treatment Plans

Probability: High

Potential Impact: Medium

  • Repository Deleted (Loss Scenario)
  • The repositories code could be updated with malicious code. If the repository is tied to an automated deployment pipeline there is a chance of the code being deployed to Prod before being detected. (I really need to find a percentage likelihood of this.)

Decision & Discussion Details

With UCSB's SSO integrated into the login, there is an implicit MFA built into the system. However, their is strong consideration to also require 2FA on all Github accounts that want to be linked to the UCSB organization.


Github Credentials Exposed in Public Source Code

Loss of credentials through accidental check-in in a public repository.

Response Classification:

Treatment Plans

  • Scan source control before check-in (ie. git-secrets)

Probability: Medium

Potential Impact:

Decision & Discussion Details

(Question) Would there be a case where both Github credentials and UCSB credentials would both be in source control? (Then again, why would either be in source control?)


Github API Credentials Exposed in Public Source Code

Loss of credentials which would give an attacker access to Github API through accidental check-in in a public repository.

Response Classification:

Treatment Plans

  • Scan source control before check-in (ie. git-secrets)

Probability: Medium

Potential Impact: Medium

  • Repository Deleted (Loss Scenario)

Loss Scenario Recovery Plans / Ideas Probability Response Classification & Status Decisiosn & Discussion Details
Repository Deleted
All Repositories Deleted


Repositories could be completely wiped out.
Repository Updated with Malicious Code

The repositories code could be updated with malicious code. If the repository is tied to an automated deployment pipeline there is a chance of the code being deployed to Prod before being detected. (I really need to find a percentage likelihood of this.)