-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Eclipse Data Space Connector (EDC) Release 23.12 Security Acceptance Criteria #75
Comments
Threat Modeling - No change because we stick to 0.5.x Version of EDC. |
@stefan-ettl kindly write the links to Sec-Topics so that the Sec-Team can check |
@stefan-ettl, what Kelaja is asking for would help plus I will need the URL to a working deployment to conduct DAST |
Hi @stefan-ettl can you please provide a link for SCA in Veracode? thank you in advance |
Hi All, EDC control plane (tractusx-edc/edc-controlplane-postgresql-azure-vault) was discussed on today's security meeting and we decided that SCA can be passed with those high findings |
Hi All, EDC Runtime Memory didn't pass the SCA due to 1 high vulnerability. |
Hi All, EDC controlplane memory hashicorp vault is passed. |
Hi All, SCA for EDC controlplane postgresql hashicorp vault is passed. |
Hi All, EDC dataplane azure vault didn't pass the SCA due to 1 high vulnerability. |
Hi All, edc-dataplane-hashicorp-vault didn't pass the SCA due to 1 high vulnerability. |
Because of the SCA, the likelyhood criteria is not met. We're not serving static content using this library. |
Proposed Release Note: Release Note EDC: EDC provides no new release compared to R23.09 (a.k.a R3.2) but only patches, EDC Version 0.5.3 is part of Release 23.12 with the following limitations: Basic Security Tests have been performed (https://github.com/eclipse-tractusx/sig-release/issues/75), TRGs 5.11, 7.01, 7.05, 7.07 cannot be fulfilled as the EDC has not been upgraded from 23.09 (QG checks - Release 23.12 tractusx-edc#885). |
Hi @stefan-ettl, I can confirm we have checked under which circumstances the vulnerability appears. According to the discoverers sources, the exploitation is only avaible when the library is used to serve static sources. Since this is not the case, the functionality cannot be abused under current circumstances, hence, is not affecting this Q.-gate. Thanks for your help and time to check this. |
@kelaja @stefan-ettl |
Thank you @RoKrish14
@kelaja could you please check the boxes as stated above? |
Release Security 23.12
Source in Catena-X Confluence and Expert Contacts here(Source only accessible for Catena-X Consortia members in current transition phase).
Threat Modelling Analysis results
Analysis completed (operations excluded):
Artifact Repository:
Prime Contacts:
Static Application Security Testing (SAST)
Best Practise:
Artifact Repository:
Prime Contacts:
Dynamic Application Security Testing (DAST)
incl API testing (if applicable)
Best Practise:
Artifact Repository:
Prime Contacts:
Secret scanning
Scan executed centrally by SEC team and ZERO valid findings
Artifact Repository:
Best Practise:
Prime Contact:
Software Composition Analysis (SCA)
Dependencies must be scanned with Veracode tool with regards to vulnerability
Best Practise:
Artifact Repository:
Prime Contacts:
Container Scan conducted
All containers in GitHub Packages must be scanned
Best Practise:
Artifact Repository:
Prime Contacts:
Infrastructure as Code
IaC code must be scanned.
Best Practise:
Artifact Repository:
Prime Contacts:
The text was updated successfully, but these errors were encountered: