-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review requirements for vulnerability scanning #3727
Comments
@theathorn to identify a more specific epic for this ticket. |
Nneka to fill-in list of all related FedRAMP controls, and then re-assign to Hannes. |
@theathorn the list of related FedRAMP Control https://docs.google.com/document/d/1LcihWQcmAbgbW7hEVOXJPvuDh5b5Jyo98dJVlv7xsf0/edit |
update from Jevan about the authentication scan issue, it is still being worked on by the Invicti help desk... they have internally escalated the issue to their developer team, so hopefully we will have a solution soon. |
@hannes-ucsc: "The team is not implementing the security scan, ITS is. Not quite sure why I would be the proper assignee." |
Triage during Thursday 10 a.m. compliance meeting. |
@hannes-ucsc to review @nolunwa's document. |
I've started to review the document but have come to the conclusion that its current structure is inadequate for its purpose, since there seems to be significant overlap between the controls. For example, the scanning of instances by Amazon Inspector (with support by the SSM agent) is mentioned in CA-7, RA-5, SI-11, SI-2 and SI-3. This leads to a highly duplicative and hard to manage document. The overlap also interferes with our ticket management since many concrete implementation tickets would have to be mentioned in multiple epics, something that is currently not possible. The best way to handle the overlap is to create a table that has the individual controls as rows and concrete implementations as columns. The individual columns should each represent a concrete implementation ticket. If we want to continue to manage controls as epics we need to pick one epic (row in the table) as the main epic for every concrete implementation ticket (column in the table). |
Tickets may belong to multiple Epics, and many of the compliance tickets do so. |
@hannes-ucsc :"you are correct. My point about the table format still applies." |
@nolunwa to restructure document according to @hannes-ucsc's proposal. |
thia has been done, closing it out |
Review the NIH Infosec Policy Handbook to answer the following questions:
What does a vulnerability scan report contain?
Does the scan only look for vulnerable binaries or should Python packages be considered as well?
Do we need to scan packages deployed to AWS Lambda?
Do we need to scan GitLab EC2 instances?
Does the report need to reference vulnerable versions of Python packages?
How is Python source code scanned in general by these tools?
Are there recommended vulnerability scanners?
Do these scanners support scanning Python programs?
What is the procedure for ignoring a vulnerability scan?
How frequently do these scans need to be run?
Review "FedRAMP vulnerability scanning requirements" and "FedRAMP vulnerability scanning requirements for containers" and highlight what the team is currently doing and gaps. Review NIH handbook for additional information on specific ask from agency on the final scanning report.
The text was updated successfully, but these errors were encountered: