You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To avoid that malicious code can be injected into our productive systems by injecting untrusted container images, we have to verify our build and delivery process and ensure that
all container images are build following SAP SLC-29 compliancy guidelines (using trusted build infrastructure, sign images)
the publishing of container images happens only via trusted container registries
consumption/deployments of container images are using only trusted container registries
AC:
Ensure that our build pipeline is using an SLC-29 compliant build-mechanism to product container images (image is also signed by the SAP Signify service)
Verify that any produced container image is only published and consumed from a trusted container registry (review of deployment manifests)
Steps to exploit
Attacker find a way to inject malicious code into our productive systems because container images were build on untrusted systems, not signed and published to untrusted container registries.
Risk assessment
Part of the Threat Modelling workshop from 2023-11-29.
Proposed mitigation
Review the build process of our container images and ensure they are build by using SLC-29 compliant build-pipelines and getting signed by SAP Signify. Verify also the deployment manifests and ensure that only images from trusted container registries will be deployed.
The text was updated successfully, but these errors were encountered:
Description
To avoid that malicious code can be injected into our productive systems by injecting untrusted container images, we have to verify our build and delivery process and ensure that
AC:
Steps to exploit
Attacker find a way to inject malicious code into our productive systems because container images were build on untrusted systems, not signed and published to untrusted container registries.
Risk assessment
Part of the Threat Modelling workshop from 2023-11-29.
Proposed mitigation
Review the build process of our container images and ensure they are build by using SLC-29 compliant build-pipelines and getting signed by SAP Signify. Verify also the deployment manifests and ensure that only images from trusted container registries will be deployed.
The text was updated successfully, but these errors were encountered: