Closed dav3r closed 1 year ago
Thanks @mcdonnnj for the solid suggestions. ๐ I'm clearly a little rusty with my Python. ๐ณ
Re-requesting review after the addition of https://github.com/cisagov/cyhy-core/pull/80/commits/d166237ae7a367b7198b36cbdaa9a4a0eda58fb6, which is needed in order to support https://github.com/cisagov/cyhy-system/issues/101 and https://github.com/cisagov/cyhy-system/issues/102.
I also updated this PR's description to mention this additional change.
These changes have been deployed to Production. I manually ran cyhy-kevsync
to pull in the new known_ransomware
data and verified that it worked as expected. I will also check the database today to ensure that tickets are getting updated appropriately with the new known_ransomware
flag.
๐ฃ Description
This PR updates
cyhy-kevsync
to read the recently-addedknownRansomwareCampaignUse
field from the CISA JSONknown_exploited_vulnerabilities_schema
and store it in the CyHyKEVDoc
database collection.Additionally, this PR updates the ticket manager to be aware of the new
known_ransomware
flag in the ticket details (see https://github.com/cisagov/cyhy-core/pull/80/commits/d166237ae7a367b7198b36cbdaa9a4a0eda58fb6). This is in support of the work needed for https://github.com/cisagov/cyhy-system/issues/101 and https://github.com/cisagov/cyhy-system/issues/102.๐ญ Motivation and context
In support of the "Ransomware Vulnerability Warning Pilot", this data needs to pulled into the CyHy database so that it can be reported to CyHy stakeholders.
Resolves https://github.com/cisagov/cyhy-system/issues/100.
๐งช Testing
I deployed these changes to a development environment, ran
cyhy-kevsync
, and confirmed that it ran successfully:I also checked the database and verified that the new field was being ingested as expected:
โ Pre-approval checklist
โ Post-merge checklist