generated from ossf/project-template
-
Notifications
You must be signed in to change notification settings - Fork 40
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
re-adding files for A_G scenario Signed-off-by: CRob <[email protected]>
- Loading branch information
1 parent
04c45ec
commit 30a723a
Showing
3 changed files
with
18 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
# Scenario Descripton | ||
## Andromeda Gales | ||
As part of the OpenSSF incident response scenario an open source product has unknowingly been compromised. A malicious payload has been merged into the underlying container image / test suite, infecting a multitude of public and private organisations on update. | ||
|
||
The infected software provides integration with numerous CI/CD build pipelines, managing the repeatable build stages for an organisation's software. The malicious payload has been designed to exfiltrate sensitive data from the target deployment and send it to a remote server. The payload is also capable of executing arbitrary code on the host system, potentially leading to further compromise. | ||
|
||
The incident response team has been tasked with identifying the malicious payload, understanding the extent of the compromise, and providing guidance on remediation steps to affected organisations. The team must also provide guidance on how to prevent similar incidents in the future.\n\nThe team has access to the following resources: | ||
|
||
- A copy of the infected container image\n- A list of affected organisations | ||
- A copy of the malicious payload | ||
- A list of build pipeline integrations | ||
- A list of potential indicators of compromise (IOCs) | ||
- A list of potential attack vectors | ||
- A list of potential remediation steps | ||
- A list of potential preventative measures | ||
|
||
The team is expected to provide a detailed incident report outlining the steps taken to identify and contain the incident, the impact of the compromise, and the recommended remediation and preventative measures. The incident report should also include a timeline of events and any lessons learned from the incident response process. |
Large diffs are not rendered by default.
Oops, something went wrong.
Binary file not shown.