Skip to content

Commit 1aa92c5

Browse files
committed
fix some issues and change to light theme
1 parent fb0e41c commit 1aa92c5

File tree

11 files changed

+952
-840
lines changed

11 files changed

+952
-840
lines changed

_config.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ gh_edit_branch: "main" # the branch that your docs is served from
140140
gh_edit_view_mode: "tree" # "tree" or "edit" if you want the user to jump into the editor immediately
141141

142142
# Color scheme currently only supports "dark", "light"/nil (default), or a custom scheme that you define
143-
color_scheme: dark
143+
color_scheme: light
144144

145145
callouts_level: quiet # or loud
146146
callouts:

_sass/base.scss

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ body {
1616
font-size: inherit;
1717
line-height: $body-line-height;
1818
color: $body-text-color;
19-
background-color: #1b1a1c;
19+
/*background-color: #1b1a1c;*/
20+
background-color: #ffffff;
2021
overflow-wrap: break-word;
2122
}
2223

_sass/layout.scss

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
z-index: 0;
55
display: flex;
66
flex-wrap: wrap;
7-
background-color: #1b1a1c;
7+
/*background-color: #1b1a1c;*/
8+
background-color: #ffffff;
89

910
@include mq(md) {
1011
flex-flow: column nowrap;
File renamed without changes.

assets/images/hadess-logo_light.png

27.4 KB
Loading

docs/plan-develop/appsec.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ By evaluating each of these factors, organizations can assign a score to a parti
102102

103103
### Response:
104104

105-
1. Execute incident response plan
105+
* Execute incident response plan
106106

107107
## OWASP SAMM
108108

docs/plan-develop/driver.md

Lines changed: 42 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -60,12 +60,36 @@ Authentication, Session Management, Access Control, Malicious Input handling, Ou
6060

6161
### Code Review
6262

63-
* Static Application Security Testing (SAST) -> FindSecbugs, Fortify, Coverity, klocwork.
64-
* Dynamic Application Security Testing (DAST) -> OWASP ZAP, BurpSuite
65-
* Interactive Application Security Testing (IAST) -> CheckMarks Varacode
66-
* Run-time Application Security Protection(RASP) -> OpenRASP
67-
* SEI CERT Coding: https://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards
68-
* Software Assurance Marketplace (SWAMP): https://www.mir-swamp.org/
63+
* **Static Application Security Testing (SAST)**
64+
65+
{: .highlight }
66+
FindSecbugs, Fortify, Coverity, klocwork.
67+
68+
* **Dynamic Application Security Testing (DAST)**
69+
70+
{: .highlight }
71+
OWASP ZAP, BurpSuite
72+
73+
* **Interactive Application Security Testing (IAST)**
74+
75+
{: .highlight }
76+
CheckMarks Varacode
77+
78+
79+
* **Run-time Application Security Protection(RASP)**
80+
81+
{: .highlight }
82+
OpenRASP
83+
84+
* **SEI CERT Coding**
85+
86+
{: .highlight }
87+
https://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards
88+
89+
* **Software Assurance Marketplace (SWAMP)**
90+
91+
{: .highlight }
92+
https://www.mir-swamp.org/
6993

7094
### Environment Hardening
7195

@@ -74,16 +98,24 @@ Authentication, Session Management, Access Control, Malicious Input handling, Ou
7498

7599
### Constant monitoring mechanism
76100

77-
1. Common vulnerabilities and exposures (CVEs)
101+
* **Common vulnerabilities and exposures (CVEs)**
102+
103+
{: .highlight }
78104
OpenVAS, NMAP
79105

80-
2. Integrity monitoring
106+
* **Integrity monitoring**
107+
108+
{: .highlight }
81109
OSSEC
82110

83-
3. Secure configuration compliance
111+
* **Secure configuration compliance**
112+
113+
{: .highlight }
84114
OpenSCAP
85115

86-
4. Sensitive information exposure
116+
* **Sensitive information exposure**
117+
118+
{: .note }
87119
No specific open source tool in this area. However, we may define specific regular expression patterns
88120

89121

docs/plan-develop/methodology.md

Lines changed: 64 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -78,82 +78,116 @@ The Microsoft SDL includes specific practices and tools for each stage of the de
7878

7979
## Security guidelines and processes
8080

81-
1- Security training:
81+
- [ ] **Security training**
82+
8283
Security awareness, Security certification program, Case study knowledge base, Top common issue, Penetration learning environment
8384
OWASP top 10, CWE top 25, OWASP VWAD
8485

85-
2- Security maturity assessment
86+
- [ ] **Security maturity assessment**
87+
8688
Microsoft SDL, OWASP SAMM self-assessment for maturity level
8789
Microsoft SDL, OWASP SAMM
8890

89-
3- Secure design
91+
- [ ] **Secure design**
92+
9093
Threat modeling templates (risks/mitigation knowledge base), Security requirements for release gate, Security design case study, Privacy protection
9194
OWASP ASVS, NIST, Privacy risk assessment
9295

93-
4- Secure coding
96+
- [ ] **Secure coding**
97+
9498
Coding guidelines (C++, Java, Python, PHP, Shell, Mobile), Secure coding scanning tools, Common secure coding case study
9599
CWE, Secure coding, CERT OWASP
96100

97-
5- Security testing
101+
- [ ] **Security testing**
102+
98103
Secure compiling options such as Stack Canary, NX, Fortify Source, PIE, and RELRO, Security testing plans, Security testing cases, Known CVE testing, Known secure coding issues, API-level security testing tools, Automation testing tools, Fuzz testing, Mobile testing, Exploitation and penetration, Security compliance
99104
Kali Linux tools, CIS
100105

101-
6- Secure deployment
106+
- [ ] **Secure deployment**
107+
102108
Configuration checklist, Hardening guide, Communication ports/protocols, Code signing
103109
CIS Benchmarks, CVE
104110

105-
7- Incident and vulnerability handling
111+
- [ ] **Incident and vulnerability handling**
112+
106113
Root cause analysis templates, Incident handling process and organization
107114
NIST SP800-61
108115

109-
8- Security training
116+
- [ ] **Security training**
117+
110118
Security awareness by email, Case study newsletter, Toolkit usage hands-on training, Security certificate and exam
111119
NIST 800- 50, NIST 800- 16, SAFECode security engineering training
112120

113121

114122

115-
## Stage 1 – basic security control
123+
Stage 1
124+
{: .label }
125+
126+
## basic security control
116127

117128
* Leverage third-party cloud service provider security mechanisms (for example, AWS provides IAM, KMS, security groups, WAF, Inspector, CloudWatch, and Config)
118129
* Secure configuration replies on external tools such as AWS Config and Inspector
119130
* Service or operation monitoring may apply to AWS Config, Inspector, CloudWatch, WAF, and AWS shield
120131

121-
Stage 2 – building a security testing team
122132

123-
Vulnerability assessment:
133+
Stage 2
134+
{: .label }
135+
## building a security testing team
136+
137+
**Vulnerability assessment**
138+
139+
{: .highlight }
124140
NMAP, OpenVAS
125141

126-
Static security analysis:
142+
**Static security analysis:**
143+
144+
{: .highlight }
127145
FindBugs for Java, Brakeman for Ruby on Rails, Infer for Java, C++, Objective C and C
128146

129-
Web security:
147+
**Web security:**
148+
149+
{: .highlight }
130150
OWASP dependency check, OWASP ZAP, Archni-Scanner, Burp Suite, SQLMap, w3af
131151

132-
Communication:
152+
**Communication:**
153+
154+
{: .highlight }
133155
Nmap, NCAT, Wireshark, SSLScan, sslyze
134156

135-
Infrastructure security:
157+
**Infrastructure security:**
158+
159+
{: .highlight }
136160
OpenSCAP, InSpec
137161

138-
VM Toolset:
162+
**VM Toolset:**
163+
164+
{: .highlight }
139165
Pentest Box for Windows, Kali Linux, Mobile Security Testing Framework
140166

141-
Security monitoring:
167+
**Security monitoring:**
168+
169+
{: .highlight }
142170
ELK, MISP—Open source Threat Intelligence Platform, OSSCE—Open source HIDS Security, Facebook/osquery—performant endpoint visibility, AlienValut OSSIM—opensource SIEM
143171

144-
Stage 3 – SDL activities
172+
Stage 3
173+
{: .label }
174+
## SDL activities
145175

146176
* Security shifts to the left and involves every stakeholder
147177
* Architect and design review is required to do threat modeling
148178
* Developers get secure design and secure coding training
149179
* Operation and development teams are as a closed-loop collaboration
150180
* Adoption of industry best practices such as OWASP SAMM and Microsoft SDL for security maturity assessment
151181

152-
Stage 4 – self-build security services
182+
Stage 4
183+
{: .label }
184+
## self-build security services
153185

154186
Take Salesforce as an example—the Salesforce Developer Center portal provides security training modules, coding, implementation guidelines, tools such as assessment tools, code scanning, testing or CAPTCHA modules, and also a developer forum. Whether you are building an application on top of salesforce or not, the Salesforce Developer Center is still a good reference not only for security knowledge but also for some open source tools you may consider applying.
155187

156-
Stage 5 – big data security analysis and automation
188+
Stage 5
189+
{: .label }
190+
## big data security analysis and automation
157191

158192
Key characteristics at this stage are:
159193

@@ -170,31 +204,31 @@ Typical open source technical components in big data analysis frameworks include
170204

171205
The key stages in big data security analysis are explained in the table:
172206

173-
Data collection:
207+
**Data collection:**
174208

175209
Collects logs from various kinds of sources and systems such as firewalls, web services, Linux, networking gateways, endpoints, and so on.
176210

177-
Data normalization:
211+
**Data normalization:**
178212

179213
Sanitizes or transforms data formats into JSON, especially, for critical information such as IP, hostname, email, port, and MAC.
180214

181-
Data enrich/label:
215+
**Data enrich/label:**
182216

183217
In terms of IP address data, it will further be associated with GeoIP and WhoIS information. Furthermore, it may also be labeled if it's a known black IP address.
184218

185-
Correlation:
219+
**Correlation:**
186220

187221
The correlation analyzes the relationship between some key characteristics such as IP, hostname, DNS domain, file hash, email address, and threat knowledge bases.
188222

189-
Storage:
223+
**Storage:**
190224

191225
There are different kinds of data that will be stored —the raw data from the source, the data with enriched information, the results of correlation, GeoIP mapping, and the threat knowledge base.
192226

193-
Alerts:
227+
**Alerts:**
194228

195229
Trigger alerts if threats were identified or based on specified alerting rules.
196230

197-
Presentation/query:
231+
**Presentation/query:**
198232

199233
Security dashboards for motoring and queries. ElasticSearch, RESTful API, or third-party SIEM.
200234

@@ -203,7 +237,7 @@ Security dashboards for motoring and queries. ElasticSearch, RESTful API, or thi
203237

204238
## Role of a security team in an organization
205239

206-
1- Security office under a CTO
240+
- [ ] **Security office under a CTO**
207241

208242
![Security office under a CTO](../../../assets/images/model1.png)
209243

@@ -218,7 +252,7 @@ Security dashboards for motoring and queries. ElasticSearch, RESTful API, or thi
218252

219253

220254

221-
2-Dedicated security team
255+
- [ ] **Dedicated security team**
222256

223257
![Dedicated security team](../../../assets/images/model2.png)
224258

@@ -231,7 +265,7 @@ Security dashboards for motoring and queries. ElasticSearch, RESTful API, or thi
231265

232266

233267

234-
3- Security technical committee (taskforce)
268+
- [ ] **Security technical committee (taskforce)**
235269

236270
![Security technical committee (taskforce)](../../../assets/images/model3.png)
237271

0 commit comments

Comments
 (0)