Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

 

Has the Release Security/Vulnerability table been updated in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponding to the latest NexusIQ scan

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

 Have Have all project containers been designed to run as a non-root user?  Project containers that run as root must document this in the release notes along with the functionality that requires the container to run as root https://wiki.onap.org/display/DW/Best+Practices

...

Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been updated in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponds to the latest NexusIQ scan

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

Has the project committed to enabling transport level encryption on   all interfaces and the option to turn it off?

 

Requirements and test cases for transport layer encryption have been   created for all interfaces not currently supporting encryption.


 

Has the project documented all open port information? 

 

 


Has the project provided the communication policy to OOM and Integration?Gildas recommends this be moved to M1

 

 

 Recommended Protocols

Do   you have a plan to address by M4 the Critical  and High vulnerabilities   in the third party libraries used within your project?

Currently also in M1 table 

 

 

Ensure by M4 the Nexus-IQ report from “Jenkins CLM” shows 0 critical   security vulnerability. Open the Nexus-IQ report for the details on each   repo.
  • Replace vulnerable packages
  • Document false positives in the release notes if it is not possible to replace the vulnerable packages
  • Document vulnerabilities inherited in dependencies: include the name of the dependency and any mitigations that can be implemented by an ONAP user


M4 Release Planning Milestone

...

Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been filled out in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponds to the latest NexusIQ scan; all NexusIQ finding are marked as   false positive or exploitable with the supporting analysis.

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

Are all Defects of priority Highest and High in status   "Closed" in Jira? (this includes the Jira for Critical and Severe   NexusIQ findings)

 

All Jira tickets for vulnerability elimination are complete.

Complete Jira tickets

Did the project achieve the enablement of transport level encryption   on all interfaces and the option of disabling transport level encryption?

 

All interfaces are exposed over TLS (or another TLS  and the secure protocol )can optionally be turned off

 

 Do Do all containers run as a non-root user and is documentation available for those containers that must run as root in order to enable ONAP features?   https://wiki.onap.org/display/DW/Best+Practices

Provide   the "% Achieved" on the CII Best   Practices program.

Moved from Development section

 

Provide link to your project CII Best Practices page.

As documented in CII   CII  Badging Program, teams have to fill out CII Best Practices

REMOVE FROM DEVELOPMENT

Is there any Critical and Severe level security   vulnerabilities older than 60 days old in the third party libraries used   within your project unaddressed?

Nexus-IQ classifies level as the following:

  •   Critical is   level 7 to 10
  •   Severe is   level 4 to 6
  •   Moderate is   level 1 to 3

which is complaint with CVSS   V2.0 rating.

 

 

 

...