Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
26 commits
Select commit Hold shift + click to select a range
54b5234
Init echo/saf integration
ChrisHinchey Oct 9, 2023
4711d17
Add harcoded profiles
ChrisHinchey Oct 12, 2023
10a24b4
Added complex search for searching mapping
ChrisHinchey Oct 19, 2023
1916415
Another iteration of regex search
ChrisHinchey Oct 19, 2023
e9f3f96
New mapping format
ChrisHinchey Oct 19, 2023
62c52da
Moved ttp mapping to seperate file
ChrisHinchey Oct 20, 2023
9fdb636
Init echo/saf integration
ChrisHinchey Oct 9, 2023
62f13b0
Add harcoded profiles
ChrisHinchey Oct 12, 2023
01ac618
Added complex search for searching mapping
ChrisHinchey Oct 19, 2023
538adbb
Another iteration of regex search
ChrisHinchey Oct 19, 2023
83dfb74
New mapping format
ChrisHinchey Oct 19, 2023
a253bce
Moved ttp mapping to seperate file
ChrisHinchey Oct 20, 2023
90d0752
Merge branch 'echo-integration' of github.com:mitre/heimdall2 into ec…
ChrisHinchey Oct 23, 2023
e1ad48c
Added github mapping and removed unused baseline
ChrisHinchey Oct 24, 2023
f5322f1
Fixed dist issue
ChrisHinchey Oct 24, 2023
8e5b592
Potential heroku fix
ChrisHinchey Oct 24, 2023
2b5bb39
Update mapping and new split convention
ChrisHinchey Dec 1, 2023
b5664dc
correct spelling and remove overlay profiles
ejaronne Dec 1, 2023
d9c47ec
Delete apps/backend/data/baselineProfiles/aws-rds-crunchy-data-postgr…
ejaronne Dec 1, 2023
4f7b309
Delete apps/backend/data/baselineProfiles/aws-rds-crunchy-data-postgr…
ejaronne Dec 1, 2023
7843651
Delete apps/backend/data/baselineProfiles/aws-rds-microsoft-sql-serve…
ejaronne Dec 1, 2023
8fdbb69
Delete apps/backend/data/baselineProfiles/aws-rds-oracle-database-12c…
ejaronne Dec 1, 2023
cd5acb9
Delete apps/backend/data/baselineProfiles/aws-rds-oracle-mysql-ee-5.7…
ejaronne Dec 1, 2023
d8f8f28
add baseline stub profiles
ejaronne Dec 19, 2023
b1f57ec
update baseline stubs
ejaronne Dec 19, 2023
9e940af
Additional mapping terms
ChrisHinchey Dec 22, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
2,098 changes: 2,098 additions & 0 deletions apps/backend/data/baselineProfiles/apache-server-2.2-stig-baseline.json

Large diffs are not rendered by default.

1,130 changes: 1,130 additions & 0 deletions apps/backend/data/baselineProfiles/apache-site-2.2-stig-baseline.json

Large diffs are not rendered by default.

2,131 changes: 2,131 additions & 0 deletions apps/backend/data/baselineProfiles/apache-tomcat-7-cis-baseline.json

Large diffs are not rendered by default.

2,132 changes: 2,132 additions & 0 deletions apps/backend/data/baselineProfiles/apache-tomcat-8-cis-baseline.json

Large diffs are not rendered by default.

2,041 changes: 2,041 additions & 0 deletions apps/backend/data/baselineProfiles/aws-foundations-cis-baseline.json

Large diffs are not rendered by default.

Large diffs are not rendered by default.

97 changes: 97 additions & 0 deletions apps/backend/data/baselineProfiles/aws-s3-baseline.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,97 @@
{
"name": "aws-s3-baseline",
"title": "aws-s3-baseline",
"maintainer": "MITRE InSpec Team",
"copyright": "MITRE, 2018",
"copyright_email": "inspec@mitre.org",
"license": "Apache-2.0",
"summary": "InSpec validation example baseline profile for AWS S3 - to test if you have public buckets",
"version": "1.0.3",
"inspec_version": ">= 4.0",
"supports": [
{
"platform": "aws"
}
],
"depends": [
{
"name": "inspec-aws",
"url": "https://github.com/inspec/inspec-aws/archive/master.tar.gz",
"status": "loaded"
}
],
"inputs": [],
"controls": [
{
"title": "Ensure there are no publicly accessible S3 buckets",
"desc": "Ensure there are no publicly accessible S3 buckets",
"descriptions": {
"default": "Ensure there are no publicly accessible S3 buckets"
},
"impact": 0.7,
"refs": [],
"tags": {
"nist": [
"AC-6",
"Rev_4"
],
"severity": "high",
"check": "Review your AWS console and note if any S3 buckets are set to\n 'Public'. If any buckets are listed as 'Public', then this is\n a finding.",
"fix": "Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. Select the permisssions tab for\n the bucket and remove the Public access permission."
},
"code": "control 's3-buckets-no-public-access' do\n impact 0.7\n title 'Ensure there are no publicly accessible S3 buckets'\n desc 'Ensure there are no publicly accessible S3 buckets'\n\n tag \"nist\": ['AC-6', 'Rev_4']\n tag \"severity\": 'high'\n\n tag \"check\": \"Review your AWS console and note if any S3 buckets are set to\n 'Public'. If any buckets are listed as 'Public', then this is\n a finding.\"\n\n tag \"fix\": \"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. Select the permisssions tab for\n the bucket and remove the Public access permission.\"\n\n exception_bucket_list = input('exception_bucket_list')\n\n aws_s3_buckets.bucket_names.each do |bucket|\n next if exception_bucket_list.include?(bucket)\n\n describe aws_s3_bucket(bucket) do\n it { should_not be_public }\n end\n end\n\n if aws_s3_buckets.bucket_names.empty?\n impact 0.0\n desc 'This control is Non Applicable since no S3 buckets were found.'\n\n describe 'This control is Non Applicable since no S3 buckets were found.' do\n skip 'This control is Non Applicable since no S3 buckets were found.'\n end\n end\nend\n",
"source_location": {
"ref": "./AWS S3/controls/aws_s3_bucket.rb",
"line": 1
},
"id": "s3-buckets-no-public-access"
},
{
"title": "Ensure there are no publicly accessible S3 objects",
"desc": "Ensure there are no publicly accessible S3 objects",
"descriptions": {
"default": "Ensure there are no publicly accessible S3 objects"
},
"impact": 0.7,
"refs": [],
"tags": {
"nist": [
"AC-6",
"Rev_4"
],
"severity": "high",
"check": "Review your AWS console and note if any S3 bucket objects are set to\n 'Public'. If any objects are listed as 'Public', then this is\n a finding.",
"fix": "Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. For each object in the bucket\n select the permissions tab for the object and remove\n the Public Access permission."
},
"code": "control 's3-objects-no-public-access' do\n impact 0.7\n title 'Ensure there are no publicly accessible S3 objects'\n desc 'Ensure there are no publicly accessible S3 objects'\n tag \"nist\": ['AC-6', 'Rev_4']\n tag \"severity\": 'high'\n\n tag \"check\": \"Review your AWS console and note if any S3 bucket objects are set to\n 'Public'. If any objects are listed as 'Public', then this is\n a finding.\"\n\n tag \"fix\": \"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. For each object in the bucket\n select the permissions tab for the object and remove\n the Public Access permission.\"\n\n exception_bucket_list = input('exception_bucket_list')\n\n aws_s3_buckets.bucket_names.each do |bucket|\n next if exception_bucket_list.include?(bucket)\n\n describe \"Public objects in Bucket: #{bucket}\" do\n subject { aws_s3_bucket_objects(bucket).where { public }.keys }\n it { should cmp [] }\n end\n end\n\n if aws_s3_buckets.bucket_names.empty?\n impact 0.0\n desc 'This control is Non Applicable since no S3 buckets were found.'\n\n describe 'This control is Non Applicable since no S3 buckets were found.' do\n skip 'This control is Non Applicable since no S3 buckets were found.'\n end\n end\nend\n",
"source_location": {
"ref": "./AWS S3/controls/aws_s3_bucket_objects.rb",
"line": 1
},
"id": "s3-objects-no-public-access"
}
],
"groups": [
{
"title": null,
"controls": [
"s3-buckets-no-public-access"
],
"id": "controls/aws_s3_bucket.rb"
},
{
"title": null,
"controls": [
"s3-objects-no-public-access"
],
"id": "controls/aws_s3_bucket_objects.rb"
}
],
"sha256": "97ab1fba4d0b387d1c97e8548ba28bbffdfd44e3c48c4e072244445fe566f1ad",
"status_message": "",
"status": "loaded",
"generator": {
"name": "inspec",
"version": "4.33.1"
}
}
12,351 changes: 12,351 additions & 0 deletions apps/backend/data/baselineProfiles/canonical-ubuntu-16.04-lts-stig-baseline.json

Large diffs are not rendered by default.

Loading