Skip to content

Commit

Permalink
- The security actions field does not need to have entries
Browse files Browse the repository at this point in the history
  • Loading branch information
shivaccuknox committed Jan 8, 2024
1 parent a4cd13f commit 9cd00ae
Show file tree
Hide file tree
Showing 6 changed files with 5 additions and 9 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,11 +57,11 @@ references:
| Title | Description | Severity | Security Actions | References |
|:-----:|-------------|----------|------------|------------|
| [DNS Manipulation](threats/mitre/dnsManipulation.yaml) | An adversary can manipulate DNS requests to redirect network traffic and potentially reveal end user activity. | high | [accuknox/preventLocalDNSHijack](actions/accuknox/preventLocalDNSHijack), [mitre/integrityProtection](actions/mitre/integrityProtection), [mitre/networkTraffic](actions/mitre/networkTraffic) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) |
| [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | [accuknox/null](actions/accuknox/null) |[FGT1190](https://fight.mitre.org/techniques/FGT1190) |
| [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | |[FGT1190](https://fight.mitre.org/techniques/FGT1190) |
| [Exploit Semi-public Facing Application](threats/mitre/exploitSemiPublicFacingApplication.yaml) | | High | [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT5029](https://fight.mitre.org/techniques/FGT5029) |
| [SupplyChainCompromise](threats/mitre/supplyChainCompromise.yaml) | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | High | [accuknox/null](actions/accuknox/null) |[FGT1195](https://fight.mitre.org/techniques/FGT51195) |
| [Unauthorized access to Network Exposure Function (NEF) via token fraud](threats/mitre/unAuthAccessNEFTokenFraud.yaml) | An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services | High | [accuknox/null](actions/accuknox/null) |[FGT5011](https://fight.mitre.org/techniques/FGT5011) |
| [Valid Accounts](threats/mitre/validAccounts.yaml) | | High | [accuknox/null](actions/accuknox/null) |[FGT1078](https://fight.mitre.org/techniques/FGT1078) |
| [SupplyChainCompromise](threats/mitre/supplyChainCompromise.yaml) | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | High | |[FGT1195](https://fight.mitre.org/techniques/FGT51195) |
| [Unauthorized access to Network Exposure Function (NEF) via token fraud](threats/mitre/unAuthAccessNEFTokenFraud.yaml) | An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services | High | |[FGT5011](https://fight.mitre.org/techniques/FGT5011) |
| [Valid Accounts](threats/mitre/validAccounts.yaml) | | High | |[FGT1078](https://fight.mitre.org/techniques/FGT1078) |
## Contributions welcome...
Expand Down
2 changes: 1 addition & 1 deletion scripts/gendoc.sh
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ extractSAs(){
exit 1
fi
SAsPath=""
actions="$(yq e -o=j '.securityActions' $1 | jq -r '.[]')"
actions="$(yq e -o=j '.securityActions' $1 | jq -r '.[]?')"
for action in $actions; do
actionPath=$(echo "[$action]($ACTIONS_DIR/$action)")
SAsPath="$actionPath, $SAsPath"
Expand Down
1 change: 0 additions & 1 deletion threats/mitre/exploitPublicFacingApplication.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ tags:
detectionMethods: # Mechanisms to detect the threat
mitigationMethods: # Mechanisms to mitigate the threat
securityActions:
- accuknox/null
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
Expand Down
1 change: 0 additions & 1 deletion threats/mitre/supplyChainCompromise.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ tags:
detectionMethods: # Mechanisms to detect the threat
mitigationMethods: # Mechanisms to mitigate the threat
securityActions:
- accuknox/null
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
Expand Down
1 change: 0 additions & 1 deletion threats/mitre/unAuthAccessNEFTokenFraud.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ tags:
detectionMethods: # Mechanisms to detect the threat
mitigationMethods: # Mechanisms to mitigate the threat
securityActions:
- accuknox/null
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
Expand Down
1 change: 0 additions & 1 deletion threats/mitre/validAccounts.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ tags:
detectionMethods: # Mechanisms to detect the threat
mitigationMethods: # Mechanisms to mitigate the threat
securityActions:
- accuknox/null
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
Expand Down

0 comments on commit 9cd00ae

Please sign in to comment.