generated from finos/standards-project-blueprint
-
Notifications
You must be signed in to change notification settings - Fork 39
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create threats.yaml for Container Registry
- Loading branch information
Showing
1 changed file
with
41 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
common_threats: | ||
- CCC.TH01 # Access control is misconfigured | ||
- CCC.TH02 # Data is intercepted in transit | ||
- CCC.TH03 # Deployment region network is untrusted | ||
- CCC.TH04 # Data is replicated to untrusted or external locations | ||
- CCC.TH05 # Data is corrupted during replication | ||
- CCC.TH06 # Data is lost or corrupted | ||
- CCC.TH07 # Logs are Tampered With or Deleted | ||
- CCC.TH09 # Logs or Monitoring Data are Read by Unauthorized Users | ||
- CCC.TH11 # Event Notifications are Incorrectly Triggered | ||
- CCC.TH12 # Resource constraints are exhausted | ||
- CCC.TH14 # Older Resource Versions Are Exploited | ||
- CCC.TH15 # Automated Enumeration and Reconnaissance by Non-Human Entities | ||
- CCC.TH16 # Non-compliance with encryption key management policies | ||
|
||
threats: | ||
- id: CCC.ContainReg.TH01 # Vulnerabilities in Artifacts are Exploited | ||
Check failure on line 17 in services/devtools/containerRegistry/threats.yaml GitHub Actions / yaml-checker / yaml-checkString does not match the pattern of "^((CCC\.TH\d{2,8})|(CCC\.\w{1,8}\.TH\d{2,8}))$". yaml-schema: file:///schemas/threats-schema.json.
|
||
title: Vulnerabilities in Artifacts are Exploited | ||
description: | | ||
Attackers exploit known vulnerabilities in container images or artifacts stored in the registry, leading to unauthorized access, data breaches, or system compromise. | ||
features: | ||
- CCC.ContainReg.F04 # Vulnerability Scanning Integration | ||
controls: | ||
- CCC.ContainReg.C01 # Implement Vulnerability Scanning for Artifacts | ||
- CCC.C04 # Log all access and changes | ||
mitre_technique: | ||
- T1190 # Exploit Public-Facing Application | ||
- T1195 # Supply Chain Compromise | ||
|
||
- id: CCC.ContainReg.TH02 # Accumulation of Unused Artifacts | ||
Check failure on line 30 in services/devtools/containerRegistry/threats.yaml GitHub Actions / yaml-checker / yaml-checkString does not match the pattern of "^((CCC\.TH\d{2,8})|(CCC\.\w{1,8}\.TH\d{2,8}))$". yaml-schema: file:///schemas/threats-schema.json.
|
||
title: Accumulation of Unused Artifacts | ||
description: | | ||
The registry accumulates outdated or unused artifacts, increasing storage costs and the risk of deploying vulnerable or untested versions. | ||
features: | ||
- CCC.ContainReg.F06 # Cleanup Policies | ||
- CCC.F18 # Versioning | ||
controls: | ||
- CCC.ContainReg.C02 # Implement Cleanup Policies for Artifacts | ||
mitre_technique: | ||
- T1490 # Inhibit System Recovery | ||
- T1485 # Data Destruction |