Giter Club home page Giter Club logo

security-intents's Introduction

Security Intents for Intent Driven Security

CI status

Repository to hold Security Intents in standard template format.

Security Threat Template

title: Scenario-title
description: Detailed description of the scenario
severity: High/Medium/Low
tags:
  - oran
  - 5gcore
  - generic
detectionMethods: # Mechanisms to detect the threat
  - name: Application log
    tag:
      - mitre/ds0015
    description: Description # Optional
    url: https://...
  - name: Process
    tag:
      - accuknox/ax0015
    description: Description # Optional
    url: https://...
mitigationMethods: # Mechanisms to mitigate the threat
  - name: Update Software
    tag:
      - mitre/ds0015
    description: desc
    url: https://...
  - name: User Account Management
    tag:
      - accuknox/ax0015
    description: desc
    url: https://...
securityActions:
  - sample-sa-1.yaml
  - sample-sa-2.yaml
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
  - sample-si-binding.yaml
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
  - name: ref1
    url: https://...
  - name: ref2
    url: https://...

Security Threats

Title Description Severity Security Actions References
DNS Manipulation An adversary can manipulate DNS requests to redirect network traffic and potentially reveal end user activity. high accuknox/preventLocalDNSHijack, mitre/integrityProtection, mitre/networkTraffic MITRE FiGHT
Exploit Public-Facing Application High FGT1190
Exploit Semi-public Facing Application High mitre/networkTraffic FGT5029
gNodeB Component Manipulation An adversary may compromise a component of gNodeB to affect radio network configuration high MITRE FiGHT
Protocol Tunneling Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. High mitre/encryptSensitiveInformation, mitre/networkTraffic FGT1572.501
Regitration of Malicious Network Functions An adversary, such as an insider to the MNO or vendor, could install a malicious NF into the core network, in order to launch other attacks or get access to information. high mitre/networkSegmentation MITRE FiGHT
Rogue xApps unauthorized access Malicious xApps may gain unauthorized access to near-RT RIC and E2 nodes High mitre/credentialAccessProtection, mitre/networkSegmentation FGT5034
Software Deployment Tools Adversaries may gain access to and use third-party software suites installed within an enterprise network, such as administration, monitoring, and deployment systems, to move laterally through the network. High accuknox/preventPkgInstall FGT1072
SupplyChainCompromise Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. High FGT1195
Unauthorized access to Network Exposure Function (NEF) via token fraud An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services High FGT5011
Valid Accounts High FGT1078

Contributions welcome...

Adding a new Security Threat

  1. Fork and clone this repository
  2. Copy res/threatTemplate.yaml template file in threats/tactic directory and edit the file's contents to accurately reflect the specific threat information. For e.g., execution tactic from MITRE FiGHT.
    cp res/threatTemplate.yaml threats/execution/threat-name.yaml
  3. Create the Security Actions file(s) you listed in the .securityActions field of the threat-name.yaml file, and place them within the actions directory. For e.g.,
    ...
    securityActions:
     - sample-sa-1.yaml 
     - sample-sa-2.yaml 
    ...
  4. Run make
  5. Raise a PR

security-intents's People

Contributors

anurag-rajawat avatar nyrahul avatar shivaccuknox avatar

Stargazers

 avatar  avatar  avatar  avatar

Watchers

 avatar

security-intents's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.