|
3 | 3 |
|
4 | 4 | ## Control Objective
|
5 | 5 |
|
| 6 | +Ensure that the application's configuration management processes are secure, reliable, and automated. This includes verifying secure build and deployment processes, proper compiler flag configurations, automated deployment scripts, removal of unnecessary features, sourcing third-party components from trusted repositories, maintaining a Software Bill of Materials (SBOM), and keeping all software components up-to-date. |
6 | 7 |
|
| 8 | +This control objective helps mitigate security vulnerabilities, ensures compliance, and maintains the integrity and availability of the application. |
7 | 9 |
|
8 | 10 | ## Testing Checklist
|
9 | 11 |
|
|
16 | 18 | | TASVS-CONF-1.4 | Verify that all unneeded features, documentation, sample applications and configurations are removed. | X | X | X |
|
17 | 19 | | TASVS-CONF-1.5 | Verify that third party components come from pre-defined, trusted and continually maintained repositories. | X | X | X |
|
18 | 20 | | TASVS-CONF-1.6 | Verify that a Software Bill of Materials (SBOM) is maintained of all third party libraries in use. | X | X | X |
|
19 |
| -| TASVS-CONF-1.7 | Ensure that all software components, libraries, frameworks, and runtimes used in the application are up-to-date and not end-of-life or obsolete. Outdated or obsolete components can introduce security vulnerabilities, performance issues, and compatibility problems. | X | X | X | |
20 | 21 |
|
21 | 22 |
|
22 | 23 | ## Control Group Definitions
|
23 | 24 |
|
24 |
| -### TASVS-CONF-1.1 |
| 25 | +### *TASVS-CONF-1 - General Configuration Checks* |
25 | 26 |
|
26 |
| -TBC |
| 27 | +### TASVS-CONF-1.1 - Verify that the application build and deployment processes are performed in a secure and repeatable way, such as CI/CD automation, automated configuration management, and automated deployment scripts. |
27 | 28 |
|
28 |
| -### TASVS-CONF-1.2 |
| 29 | +Build and deployments processes should be automated, secure, and repeatable. This includes using CI/CD automation, automated configuration management, and automated deployment scripts. These processes help ensure that the application is built and deployed consistently and securely, reducing the risk of errors and vulnerabilities. |
29 | 30 |
|
30 |
| -TBC |
| 31 | +### TASVS-CONF-1.2 - Verify that compiler flags are configured to enable all available buffer overflow protections and warnings, including stack randomization, data execution prevention, and to break the build if an unsafe pointer, memory, format string, integer, or string operations are found. |
31 | 32 |
|
32 |
| -### TASVS-CONF-1.3 |
| 33 | +Compiler flags should be configured to enable all available buffer overflow protections and warnings, including stack randomization, data execution prevention, and to break the build if an unsafe pointer, memory, format string, integer, or string operations are found. These protections help prevent common security vulnerabilities such as buffer overflows and format string vulnerabilities. |
33 | 34 |
|
34 |
| -TBC |
| 35 | +### TASVS-CONF-1.3 - Verify that the application, configuration, and all dependencies can be re-deployed using automated deployment scripts, built from a documented and tested runbook in a reasonable time, or restored from backups in a timely fashion. |
35 | 36 |
|
36 |
| -### TASVS-CONF-1.4 |
| 37 | +The application, configuration, and all dependencies should be able to be re-deployed using automated deployment scripts, built from a documented and tested runbook in a reasonable time, or restored from backups in a timely fashion. This ensures that the application can be quickly restored in the event of a failure or disaster, reducing downtime and ensuring business continuity. |
37 | 38 |
|
38 |
| -TBC |
| 39 | +### TASVS-CONF-1.4 - Verify that all unneeded features, documentation, sample applications and configurations are removed. |
39 | 40 |
|
40 |
| -### TASVS-CONF-1.5 |
| 41 | +Unneeded features, documentation, sample applications, and configurations should be removed from the application. This helps reduce the attack surface of the application, improve performance, and simplify maintenance. Removing unnecessary features also reduces the risk of security vulnerabilities and compliance issues. |
41 | 42 |
|
42 |
| -TBC |
| 43 | +### TASVS-CONF-1.5 - Verify that third party components come from pre-defined, trusted and continually maintained repositories. |
43 | 44 |
|
44 |
| -### TASVS-CONF-1.6 |
| 45 | +Third-party components should come from pre-defined, trusted, and continually maintained repositories. This helps ensure that the components are secure, reliable, and up-to-date. Sourcing components from trusted repositories reduces the risk of introducing security vulnerabilities, malware, or other issues into the application. |
45 | 46 |
|
46 |
| -TBC |
| 47 | +### TASVS-CONF-1.6 - Verify that a Software Bill of Materials (SBOM) is maintained of all third party libraries in use. |
47 | 48 |
|
48 |
| -### TASVS-CONF-1.7 |
49 |
| - |
50 |
| -TBC |
| 49 | +A Software Bill of Materials (SBOM) should be maintained of all third-party libraries in use. An SBOM provides a detailed inventory of all software components used in the application, including third-party libraries, frameworks, and runtimes. This helps track dependencies, identify vulnerabilities, and ensure compliance with licensing requirements. |
51 | 50 |
|
52 | 51 |
|
53 | 52 | \newpage{}
|
0 commit comments