Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review requirements for vulnerability scanning #3727

Closed
theathorn opened this issue Jan 10, 2022 · 12 comments
Closed

Review requirements for vulnerability scanning #3727

theathorn opened this issue Jan 10, 2022 · 12 comments
Assignees
Labels
- [priority] Medium compliance [subject] Information and software security doc [subject] Internal and external documentation enh [type] New feature or request orange [process] Done by the Azul team spike:1 [process] Spike estimate of one point

Comments

@theathorn
Copy link

theathorn commented Jan 10, 2022

Review the NIH Infosec Policy Handbook to answer the following questions:

What does a vulnerability scan report contain?
Does the scan only look for vulnerable binaries or should Python packages be considered as well?
Do we need to scan packages deployed to AWS Lambda?
Do we need to scan GitLab EC2 instances?
Does the report need to reference vulnerable versions of Python packages?
How is Python source code scanned in general by these tools?
Are there recommended vulnerability scanners?
Do these scanners support scanning Python programs?
What is the procedure for ignoring a vulnerability scan?
How frequently do these scans need to be run?

Review "FedRAMP vulnerability scanning requirements" and "FedRAMP vulnerability scanning requirements for containers" and highlight what the team is currently doing and gaps. Review NIH handbook for additional information on specific ask from agency on the final scanning report.

@github-actions github-actions bot added the orange [process] Done by the Azul team label Jan 10, 2022
@melainalegaspi melainalegaspi added doc [subject] Internal and external documentation task [type] Resolution requires engineering action other than code changes labels Jan 11, 2022
@melainalegaspi
Copy link

@theathorn to identify a more specific epic for this ticket.

@theathorn theathorn changed the title Review NIH Infosec Policy Handbook Review requirements for vulnerability scanning Jan 12, 2022
@theathorn
Copy link
Author

Nneka to fill-in list of all related FedRAMP controls, and then re-assign to Hannes.

@theathorn theathorn added enh [type] New feature or request compliance [subject] Information and software security and removed task [type] Resolution requires engineering action other than code changes labels Jul 21, 2022
@nolunwa-ucsc
Copy link

@nolunwa-ucsc
Copy link

update from Jevan about the authentication scan issue, it is still being worked on by the Invicti help desk... they have internally escalated the issue to their developer team, so hopefully we will have a solution soon.

@melainalegaspi
Copy link

@hannes-ucsc: "The team is not implementing the security scan, ITS is. Not quite sure why I would be the proper assignee."

@melainalegaspi
Copy link

Triage during Thursday 10 a.m. compliance meeting.

@theathorn
Copy link
Author

@hannes-ucsc to review @nolunwa's document.

@theathorn theathorn added the spike:1 [process] Spike estimate of one point label Aug 4, 2022
@hannes-ucsc
Copy link
Member

I've started to review the document but have come to the conclusion that its current structure is inadequate for its purpose, since there seems to be significant overlap between the controls. For example, the scanning of instances by Amazon Inspector (with support by the SSM agent) is mentioned in CA-7, RA-5, SI-11, SI-2 and SI-3. This leads to a highly duplicative and hard to manage document. The overlap also interferes with our ticket management since many concrete implementation tickets would have to be mentioned in multiple epics, something that is currently not possible.

The best way to handle the overlap is to create a table that has the individual controls as rows and concrete implementations as columns. The individual columns should each represent a concrete implementation ticket. If we want to continue to manage controls as epics we need to pick one epic (row in the table) as the main epic for every concrete implementation ticket (column in the table).

@hannes-ucsc hannes-ucsc removed their assignment Aug 29, 2022
@theathorn
Copy link
Author

Tickets may belong to multiple Epics, and many of the compliance tickets do so.

@melainalegaspi
Copy link

@hannes-ucsc :"you are correct. My point about the table format still applies."

@melainalegaspi
Copy link

@nolunwa to restructure document according to @hannes-ucsc's proposal.

@hannes-ucsc hannes-ucsc added the - [priority] Medium label Oct 5, 2023
@nolunwa-ucsc
Copy link

thia has been done, closing it out

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
- [priority] Medium compliance [subject] Information and software security doc [subject] Internal and external documentation enh [type] New feature or request orange [process] Done by the Azul team spike:1 [process] Spike estimate of one point
Projects
None yet
Development

No branches or pull requests

5 participants