Skip to content

Commit 12e8a78

Browse files
authored
Adding clarification on crypto discovery tools to resolve #2395 (#2450)
* Adding clarification on crypto discovery tools to resolve #2395 * Clarify wording
1 parent 9f316d8 commit 12e8a78

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

5.0/en/0x14-V6-Cryptography.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,10 @@ Applications need to be designed with strong cryptographic architecture to prote
2020

2121
Architectural requirements are intrinsic to the entire code base, and thus difficult to unit or integration test. Architectural requirements require consideration in coding standards, throughout the coding phase, and should be reviewed during security architecture, peer or code reviews, or retrospectives.
2222

23-
It is also important to ensure that all cryptographic assets, such as algorithms, keys, and certificates, are regularly discovered, inventoried, and assessed.
23+
It is also important to ensure that all cryptographic assets, such as algorithms, keys, and certificates, are regularly discovered, inventoried, and assessed. For Level 3, this should include the use of static and dynamic scanning to discover the use of cryptography in an application. Tools such as SAST and DAST may help with this but it is possible that dedicated tools would be needed to get more comprehensive coverage. Freeware examples of tools include:
24+
25+
* [CryptoMon - Network Cryptography Monitor - using eBPF, written in python](https://github.com/Santandersecurityresearch/CryptoMon)
26+
* [Cryptobom Forge Tool: Generating Comprehensive CBOMs from CodeQL Outputs](https://github.com/Santandersecurityresearch/cryptobom-forge)
2427

2528
| # | Description | L1 | L2 | L3 | CWE |
2629
| :---: | :--- | :---: | :---: | :---: | :---: |

0 commit comments

Comments
 (0)