cisagov / ScubaGoggles

SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
https://www.cisa.gov/resources-tools/services/secure-cloud-business-applications-scuba-project
Creative Commons Zero v1.0 Universal
149 stars 20 forks source link

Remove GWS.CHAT.5.1 #322

Closed jkaufman-mitre closed 2 months ago

jkaufman-mitre commented 3 months ago

๐Ÿ—ฃ Description

Remove Chat.5.1 as Chat apps are now also controlled by the marketplace settings (see CommonControls.11.1).

๐Ÿ’ญ Motivation and context

Fixes #222 Google Update

๐Ÿงช Testing

โœ… Pre-approval checklist

โœ… Pre-merge Checklist

โœ… Post-merge Checklist

jkaufman-mitre commented 3 months ago

@adhilto This PR is still waiting to be reviewed.

adhilto commented 3 months ago

Going back to the original discussion of this policy. Chat 5.1 is currently contradictory to our current stance with Common Controls 11.1. If Common Controls 11.1 allowlisting is not enforced, then turning this setting on allows any user to install any chat app. Which is insecure.

It seems that we should either delete this baseline and enforce Common Controls as a SHALL but leave the decision to enable this setting up to organizations/agencies

OR

We should rewrite this policy to make it organizational unit specific. example:

The ability to install Chat apps SHALL be disabled for the top-level organizational unit

_Note:_ The ability to install Chat apps MAY be enabled on a per OU basis.

This is to prevent the default of allowing anyone to install Chat apps if App allowlisting is not enforce but allow flexibility for specific organizational units to install chat applications.

I agree with David on this one. I'll also add that per the research you documented here:

Therefore, my vote would be that we delete CHAT.5.1 entirely.

jkaufman-mitre commented 3 months ago

@adhilto @buidav Turning this setting on does not override Common Controls 11.1. In the contrary, turning this off does not allow users to install any chat app. Turning this feature one allows users to install allowlisted chat apps.

Not allowing any user to install any app could be a hinderance to the user.

jkaufman-mitre commented 3 months ago

My vote would be to make this policy a SHOULD because if there is no need for users to have chat apps, then it should be disabled to protect the org.

Removing this policy all together would allow for this setting to be on which is could allow for unauthorized apps to be installed if an admin account gets compromised. We should have a baseline stating that it SHOULD be disabled and add a not that if there is an organizational need for chat apps then it can be enabled.

My recommendation is for the policy to be: "User-level ability to install Chat apps SHOULD be disabled."

jkaufman-mitre commented 3 months ago

@adhilto, Also I realized that the PR changes did not reflect what my recommendation was, so went in ad commited the updated policy statement.

adhilto commented 3 months ago

@adhilto, Also I realized that the PR changes did not reflect what my recommendation was, so went in ad commited the updated policy statement.

Thanks for pointing that out, that completely changes the discussion.

@adhilto @buidav Turning this setting on does not override Common Controls 11.1.

David did not claim that it does. His point was that if Common Controls 11.1 was not implemented and this setting were on, users could install any Chat app. I haven't tested this myself but it certainly seems like that would be the case. Regardless, since you updated it from "SHOULD be enabled" to "SHOULD be disabled," this point is no longer important.

Not allowing any user to install any app could be a hinderance to the user.

Hindrance, yes. Security risk? No. Though it is a reason for why we wouldn't want to require this setting be disabled, which is now the current recommendation.

Weighing both sides of the issue, the reason for including 5.1 "SHOULD be disabled" is as follows:

Reason for enabling "Allow users to install Chat apps":

Weighing both those two points, I'm inclined to think that this is a setting that we need don't need to take a stance on. Since the security benefit is so minimal and the usability cost so high, each agency should be permitted to weigh the tradeoffs themselves and make their own decision. In other words, I'm still in favor of cutting this control.

That said, as the interactions between these two settings isn't immediately obvious, it could be useful to document and explain this somewhere, so that agencies are able to make an informed decision. We should not mandate that this setting be ON or OFF though.

jkaufman-mitre commented 2 months ago

We will go ahead an remove CHAT.5.1v0.2 and make COMMONCONTROLS.11.1v0.2 a SHALL.

jkaufman-mitre commented 2 months ago

Policy Group 5 has been removed. @adhilto Ready for review again.

adhilto commented 2 months ago

Policy Group 5 has been removed. @adhilto Ready for review again.

Just need to update the table of contents. Other than that looks good.

adhilto commented 2 months ago

@buidav I just implemented the Rego changes, ready for your review.

jkaufman-mitre commented 2 months ago

@adhilto @buidav I have updated the Table of Content.

mdueltgen commented 2 months ago

@adhilto @buidav Any finals thoughts on this or are we good to merge? I think all changes requested were handled.