Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

"The project MUST have performed a security review within the last 5 years. This review MUST consider the security requirements and security boundary." – Best Practices Badging Criterion

...

Your Answer-Please ExplainSECCOM Feedback / Recommendations

We do have clear text default credentials in our docker-compose files if not provided (Only used for testing)


The user should override credentials and strategy around these 


Security Documentation

Documentation Architecture

...

Could not find this document/wiki
Your Answer-Please DescribeSECCOM Feedback / Recommendations
None available

Assurance Case

Does your project actually meet its documented security requirements?

...

Could not find this document/wiki
Your Answer-Please DescribeSECCOM Feedback / Recommendations
None available

Vulnerability Mitigation

Vulnerabilities Critical Fixed

...

Your Answer-Please ExplainSECCOM Feedback / Recommendations

Yes. Critical vulnerabilities/issues are compiled by SECCOM periodically and CPS project team resolves them in-time for current/prev release.

We also check sonarcloud reports on a weekly basis and if needed action is taken.



Non-Cryptographic Software Questions

...

notifications
Your Answer-Please ExplainSECCOM Feedback / Recommendations

We will receive a lot

of models and data from NEs... are these trusted? 

Subscriptions also?


Hardening

Does your project apply hardening mechanisms so that software defects are less likely to result in security vulnerabilities?

...

Your Answer-Please ExplainSECCOM Feedback / Recommendations

Need to discuss from java/RESTful viewpoint


CPS does not have a UI and does not use javascript



Cryptographic-specific Software Questions

...

Your Answer-Please ExplainSECCOM Feedback / RecommendationsCPS does not include any internal module to implement cryptograph... what do we use?

...

N/A

Crypto Random - Generic

Does your software use random information? If so, does it use a cryptographically secure random number generator?

...

. is this secure?
Your Answers-Please ExplainSECCOM Feedback / Recommendations

CPS does generate random UUIDs for notifications.


CPS uses built in java libraries (java.

util.UUID) for UUIDs.


Crypto Weaknesses

Does your software depend on any cryptographic algorithms or modes that have known serious weaknesses?

...

Your Answer-Please ExplainSECCOM Feedback / Recommendations
N/A

Crypto Working

Does your software depend on any cryptographic algorithms that are known to be broken?

...

Your Answer-Please ExplainSECCOM Feedback / Recommendations
Not that the team is aware of

Crypto Keylength

Does your software generate any keys? If so, do they use any default key-lengths that are considered insecure?

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations
No, we don't

Crypto Algorithm Agility

Does your software use cryptographic algorithms? If so, can a user of ONAP switch the algorithm if one is found to be broken?

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations
This does not apply 

Crypto Certificate Verification

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations

Crypto Credential Agility

We have not switched to HTTPS. 


We are planning to switch using service mesh


Crypto Credential Agility

Does your software save or process authentication credentials or private cryptographic keys? If so, is that information stored separately from other information?

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations
No we don't

Crypto TLS1.2

Does your software support HTTPS? If so, is the minimum version allowed TLS1.2?

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations

We have not switched to HTTPS. 


We are planning to switch using service mesh


Crypto Used Network

Does your software have network communications inbound or outbound? If so, do you support secure protocols for all such network communications?

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations

CPS only communicates with components within ONAP


Not sure what is considered to be inbound and outbound communications

What is the boundary?


Crypto Verification Private

...

Your Answers-Please ExplainSECCOM Feedback / Recommendations

We have not switched to HTTPS. 


We are planning to switch using service mesh