Riccardo-ten-Cate / skf

Security knowledge framework
0 stars 0 forks source link

sad #54

Open Riccardo-ten-Cate opened 5 years ago

Riccardo-ten-Cate commented 5 years ago

sad

skf-integration[bot] commented 5 years ago

Security knowledge framework!

alt text

Does the sprint implement/changes authentication?

- [ ] 8.4 Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. - [ ] 8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. - [ ] 13.1 Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications.

Does the sprint implement/changes CI/CD pipelines?

- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development.

Expand knowledge base item Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It
- [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services ``` Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It ```

Does the sprint allows users to get files from the file system?

- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services

skf-integration[bot] commented 5 years ago

Security knowledge framework!

alt text

Does the sprint implement/changes authentication?

- [ ] 8.4 Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. - [ ] 8.11 Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. - [ ] 13.1 Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications.

Does the sprint implement/changes CI/CD pipelines?

- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development.

Expand knowledge base item Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It
- [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services ``` Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It ```

Does the sprint allows users to get files from the file system?

- [ ] 1.1.1 Verify the use of a secure software development lifecycle that addresses security in all stages of development. - [ ] 1.1.5 Verify definition and security analysis of the application's high-level architecture and all connected remote services