Closed kelaja closed 11 months ago
@kelaja @guenterban PEN KeyCloak seems not to be working to successfully execute DAST tests. https://github.com/eclipse-tractusx/sig-infra/issues/346
invicti scan passed with only medium and lower findings: https://www.netsparkercloud.com/scans/report/6addd8f3e5084e13a4c9b0b901f75d8c/ No new findings compared to last QG
@guenterban Alignment took place by telephone on 13.11.2023. As there have been no changes since release 3.2, it is not necessary to update the Threat Modelling Analysis results
Secret scanning No secrets found in secret scan: https://github.com/eclipse-tractusx/item-relationship-service/security/secret-scanning
Static Application Security Testing (SAST) 32x the same medium finding, all are mitigated:
Software Composition Analysis (SCA) No vulnerabilities in dependencies
Container Scan conducted No issues found in container scan: https://github.com/eclipse-tractusx/item-relationship-service/security/code-scanning?query=is%3Aopen+branch%3Amain+tool%3ATrivy
Infrastructure as Code No errors found by KICS, only warnings: https://github.com/eclipse-tractusx/item-relationship-service/security/code-scanning?query=is%3Aopen+branch%3Amain+tool%3ATrivy%2CKICS
Hi @kelaja
kindly ask to close this ticket now. We have achieved all checks, is there anything more to do?
Release Security 23.12
Source in Catena-X Confluence and Expert Contacts here(Source only accessible for Catena-X Consortia members in current transition phase).
[x] Threat Modelling Analysis results Analysis completed (operations excluded):
Artifact Repository:
Prime Contacts:
[x] Static Application Security Testing (SAST)
https://github.com/eclipse-tractusx/item-relationship-service/issues/237
high and above not accepted
Best Practise:
Artifact Repository:
Prime Contacts:
https://github.com/eclipse-tractusx/item-relationship-service/issues/237 incl API testing (if applicable)
evidence by re-scan
Best Practise:
Artifact Repository:
Prime Contacts:
https://github.com/eclipse-tractusx/item-relationship-service/issues/237 Scan executed centrally by SEC team and ZERO valid findings
Artifact Repository:
Best Practise:
Prime Contact:
https://github.com/eclipse-tractusx/item-relationship-service/issues/237 Dependencies must be scanned with Veracode tool with regards to vulnerability
high and above not accepted
FOSS whitelist policy has to be passed
Best Practise:
Confirm relevant repository as early as possible to SEC team to enable regular, automated scans. Evidence required for Gate approval.
Artifact Repository:
Veracode UI
(& GitHub Action)
Prime Contacts:
Security Team: SEC1
https://github.com/eclipse-tractusx/item-relationship-service/issues/237 All containers in GitHub Packages must be scanned
Best Practise:
Artifact Repository:
Prime Contacts:
[x] Infrastructure as Code IaC code must be scanned.
Best Practise:
Artifact Repository:
Prime Contacts: