Skip to content

Latest commit

 

History

History
90 lines (61 loc) · 3.2 KB

08_03_security_concept.md

File metadata and controls

90 lines (61 loc) · 3.2 KB

Security Assessment Policy-Hub

Contact for product @evegufy
@jjeroch
Security responsible @szymonkowalczykzf
@pablosec
Version number of product 1.0.0
Dates of assessment 2024-02-16: Assessment
2024-05-15 Re-Assessment for 1.0.0
Status of assessment final

Product Description

The Policy-Hub product is a read-only REST API project, without implementation of an UI. (Pure Backend Component)

The main purpose of the product is to provide interested and authenticated CX Users with read access to policy data, use cases, credential types and policy rules, which are created during an application seeding.

The Policy-Hub comprises the technical foundation for interaction, monitoring, auditing and further functionalities.

The product can be run anywhere: it can be deployed as a docker image, e. g. on Kubernetes (platform-independent, cloud, on prem or local).

The policy hub is using following key frameworks:

  • .Net
  • Entity Framework

Development Concept

Data Flow Diagram

flowchart LR

    CU(Company user)
    K("Keycloak (REST API)")
    PH(Policy Hub API)
    PHD[("Postgres Database \n \n (Data created with \n application seeding)")]

    subgraph centralidp[centralidp Keycloak]
     K
    end

    subgraph companyrealm[SharedIdP Keycloak or ownIdP]
     CU
    end

    subgraph Policy-Hub Product
     PH
     PHD
    end

    K-->|"Authentication & Authorization Data \n (Using JWT)"|PH
    CU-->|"Consumption of central, read-only REST API \n [HTTPS]"|PH
    PH-->|"Read policies, use cases, \n credential types, policy rules"|PHD
    CU-->|"IAM with OIDC \n [HTTPS]"|K
Loading

Changes compared to last Security Assessment

  • upgrade to .NET 8
  • new seeding data

Features for Upcoming Versions

N/A

Threats & Risks

All potential threats discussed during the assessment were already mitigated.

Mitigated Threats

N/A

Performed Security Checks

  • Static Application Security Testing (SAST) - CodeQL
  • Dynamic Application Security Testing (DAST) - OWASP ZAP
  • Secret Scanning - GitGuardian
  • Software Composition Analysis (SCA) - SNYK
  • Container Scan conducted - Trivy
  • Infrastructure as Code - KICS
  • Securing code, dependencies, containers, IaC and Cloud Deployments - SNYK

NOTICE

This work is licensed under the Apache-2.0.