diff --git a/README.md b/README.md index 39b66c3..dc70c4e 100644 --- a/README.md +++ b/README.md @@ -57,11 +57,11 @@ references: | Title | Description | Severity | Security Actions | References | |:-----:|-------------|----------|------------|------------| | [DNS Manipulation](threats/mitre/dnsManipulation.yaml) | An adversary can manipulate DNS requests to redirect network traffic and potentially reveal end user activity. | high | [accuknox/preventLocalDNSHijack](actions/accuknox/preventLocalDNSHijack), [mitre/integrityProtection](actions/mitre/integrityProtection), [mitre/networkTraffic](actions/mitre/networkTraffic) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) | - | [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | [accuknox/null](actions/accuknox/null) |[FGT1190](https://fight.mitre.org/techniques/FGT1190) | + | [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | |[FGT1190](https://fight.mitre.org/techniques/FGT1190) | | [Exploit Semi-public Facing Application](threats/mitre/exploitSemiPublicFacingApplication.yaml) | | High | [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT5029](https://fight.mitre.org/techniques/FGT5029) | - | [SupplyChainCompromise](threats/mitre/supplyChainCompromise.yaml) | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | High | [accuknox/null](actions/accuknox/null) |[FGT1195](https://fight.mitre.org/techniques/FGT51195) | - | [Unauthorized access to Network Exposure Function (NEF) via token fraud](threats/mitre/unAuthAccessNEFTokenFraud.yaml) | An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services | High | [accuknox/null](actions/accuknox/null) |[FGT5011](https://fight.mitre.org/techniques/FGT5011) | - | [Valid Accounts](threats/mitre/validAccounts.yaml) | | High | [accuknox/null](actions/accuknox/null) |[FGT1078](https://fight.mitre.org/techniques/FGT1078) | + | [SupplyChainCompromise](threats/mitre/supplyChainCompromise.yaml) | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | High | |[FGT1195](https://fight.mitre.org/techniques/FGT51195) | + | [Unauthorized access to Network Exposure Function (NEF) via token fraud](threats/mitre/unAuthAccessNEFTokenFraud.yaml) | An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services | High | |[FGT5011](https://fight.mitre.org/techniques/FGT5011) | + | [Valid Accounts](threats/mitre/validAccounts.yaml) | | High | |[FGT1078](https://fight.mitre.org/techniques/FGT1078) | ## Contributions welcome... diff --git a/scripts/gendoc.sh b/scripts/gendoc.sh index 799498e..e7fbd6f 100755 --- a/scripts/gendoc.sh +++ b/scripts/gendoc.sh @@ -52,7 +52,7 @@ extractSAs(){ exit 1 fi SAsPath="" - actions="$(yq e -o=j '.securityActions' $1 | jq -r '.[]')" + actions="$(yq e -o=j '.securityActions' $1 | jq -r '.[]?')" for action in $actions; do actionPath=$(echo "[$action]($ACTIONS_DIR/$action)") SAsPath="$actionPath, $SAsPath" diff --git a/threats/mitre/exploitPublicFacingApplication.yaml b/threats/mitre/exploitPublicFacingApplication.yaml index 420b680..c74a8cc 100644 --- a/threats/mitre/exploitPublicFacingApplication.yaml +++ b/threats/mitre/exploitPublicFacingApplication.yaml @@ -8,7 +8,6 @@ tags: detectionMethods: # Mechanisms to detect the threat mitigationMethods: # Mechanisms to mitigate the threat securityActions: - - accuknox/null securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat references: diff --git a/threats/mitre/supplyChainCompromise.yaml b/threats/mitre/supplyChainCompromise.yaml index 874d355..0766f8d 100644 --- a/threats/mitre/supplyChainCompromise.yaml +++ b/threats/mitre/supplyChainCompromise.yaml @@ -8,7 +8,6 @@ tags: detectionMethods: # Mechanisms to detect the threat mitigationMethods: # Mechanisms to mitigate the threat securityActions: - - accuknox/null securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat references: diff --git a/threats/mitre/unAuthAccessNEFTokenFraud.yaml b/threats/mitre/unAuthAccessNEFTokenFraud.yaml index 6e870ed..bc372bb 100644 --- a/threats/mitre/unAuthAccessNEFTokenFraud.yaml +++ b/threats/mitre/unAuthAccessNEFTokenFraud.yaml @@ -8,7 +8,6 @@ tags: detectionMethods: # Mechanisms to detect the threat mitigationMethods: # Mechanisms to mitigate the threat securityActions: - - accuknox/null securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat references: diff --git a/threats/mitre/validAccounts.yaml b/threats/mitre/validAccounts.yaml index 3d1cfd1..562545f 100644 --- a/threats/mitre/validAccounts.yaml +++ b/threats/mitre/validAccounts.yaml @@ -8,7 +8,6 @@ tags: detectionMethods: # Mechanisms to detect the threat mitigationMethods: # Mechanisms to mitigate the threat securityActions: - - accuknox/null securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat references: