Mitigation for threat: "A threat actor with access to a Jenkins server deployed by the CGD Toolkit can modify and/or delete pipeline configurations, introduce malicious code, and gain access to version control source code used in the pipelines, which leads to compromised build artifacts and deployments, resulting in reduced integrity and/or confidentiality of game builds and the customer's AWS environment(s)"
Solution/User Experience
The initial configuration should log all use activities, especially changes to config, build processes, and deployment actions. Looks like this can be achieved if we enable to audit trail plugin by default. Configure audit trail plugin output to logs and then something like cw agent to push to CWL as a configurable deployment option that defaults to including it.
Use case
Mitigation for threat: "A threat actor with access to a Jenkins server deployed by the CGD Toolkit can modify and/or delete pipeline configurations, introduce malicious code, and gain access to version control source code used in the pipelines, which leads to compromised build artifacts and deployments, resulting in reduced integrity and/or confidentiality of game builds and the customer's AWS environment(s)"
Solution/User Experience
The initial configuration should log all use activities, especially changes to config, build processes, and deployment actions. Looks like this can be achieved if we enable to audit trail plugin by default. Configure audit trail plugin output to logs and then something like cw agent to push to CWL as a configurable deployment option that defaults to including it.
Alternative solutions
No response