Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update relational database controls from markdown to yaml #540

Merged
merged 12 commits into from
Jan 20, 2025
69 changes: 63 additions & 6 deletions services/database/relational/controls.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,25 +7,82 @@ common_controls:
- CCC.C06 # Prevent deployment in restricted regions
- CCC.C07 # Alert on non-human enumeration
- CCC.C09 # Prevent tampering, deletion, or unauthorized access to access logs
- CCC.C10 # Prevent data replication to destinations outside of defined trust perimeter
- CCC.C10 # Prevent data replication to destinations outside of perimeter

controls:
- id: CCC.RDMS.C01
title: backup database to alternative trust-zone
title: Backup Database to Alternative Trust-Zone
objective: |
Ensure that databases are backed up and the backup is outside of the applications trust-zone
Ensure that databases are backed up and the backup is outside of the
applications trust-zone
control_family: Data
threats:
- CCC.RDMS.TH14 # DB backup is uninentionally restored
- CCC.RDMS.TH14 # DB backup is unintentionally restored
nist_csf: PR.DS-11
control_mappings:
NIST_800_53:
- CP-6
test_requirements:
- id: CCC.RDMS.C01.TR01
text: |
From the same trust-zone as the database attempt to access the database backup and ensure that access is
denied
From the same trust-zone as the database attempt to access
the database backup and ensure that access is denied
tlp_levels:
- tlp_red
- tlp_amber

- id: CCC.RDMS.C02
title: Disable Access with Default Credentials
objective: |
Ensure that default credentials are disabled and only authorized
roles can access database resources.
control_family: Data
nist_csf: PR.AC-5
threats:
- CCC.RDMS.TH01 # Unauthorized access to database
control_mappings:
CCM:
- IAM-09
- IAM-13
ISO_27001:
- 2013 A.9.2.6
NIST_800_53:
- AC-17
test_requirements:
- id: CCC.RDMS.C02.TR01
text: Secure Database Access Control
tlp_levels:
- tlp_red
- tlp_amber

- id: CCC.RDMS.C03
title: Restrict Snapshot Collection To Trusted Roles
objective: Limit snapshot collection capabilities to trusted roles.
control_family: Data
nist_csf: PR.DS-3
threats:
- CCC.RDMS.TH02 # Unauthorized cross organization snapshot collection
control_mappings:
CCM:
- DSI-05
- DSI-07
ISO_27001:
- 2013 A.12.3.1
NIST_800_53:
- CP-09
test_requirements:
- id: CCC.RDMS.C3.TR01
text: Snapshot collection by trusted roles
tlp_levels:
- tlp_red
- tlp_amber
- id: CCC.RDMS.C03.TR02
text: Restriction of snapshot collection capabilities
tlp_levels:
- tlp_red
- tlp_amber
- id: CCC.RDMS.C03.TR03
text: Prevent unauthorized snapshot collection
tlp_levels:
- tlp_red
- tlp_amber
12 changes: 8 additions & 4 deletions services/database/relational/features.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -39,11 +39,13 @@ features:
- id: CCC.RDMS.F06
title: DB Managed Credentials
description: |
Ability to managed the database credentials using the cloud provider's secret management service.
Ability to managed the database credentials using the cloud
provider's secret management service.
- id: CCC.RDMS.F07
title: DB Self Managed Credentials
description: |
Ability to manage the database credentials by client managed username and passwords.
Ability to manage the database credentials by client managed
username and passwords.
- id: CCC.RDMS.F08
title: Support for IPv4
description: |
Expand Down Expand Up @@ -71,12 +73,14 @@ features:
- id: CCC.RDMS.F14
title: Dedicated Database Instances
description: |
Option to deploy the database on a dedicated instance for isolation requirements.
Option to deploy the database on a dedicated instance for
isolation requirements.
- id: CCC.RDMS.F15
title: Horizontal Scaling
description: |
Read replicas of the primary database can be created.
- id: CCC.RDMS.F16
title: Failover
description: |
Standby database can be implemented for failover when the primary can't be reached.
Standby database can be implemented for failover when the
primary can't be reached.
26 changes: 17 additions & 9 deletions services/database/relational/threats.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,9 @@ threats:
- id: CCC.RDMS.TH01
title: Unauthorized access to database
description: |
A threat actor gains unauthorized access to the cloud relational database by
using a compromised role or using default administrative credentials.
A threat actor gains unauthorized access to the cloud relational
database by using a compromised role or using default
administrative credentials.
features:
- CCC.RDMS.F01 # SQL Support
- CCC.F06 # Identity Based Access Control
Expand All @@ -27,8 +28,9 @@ threats:
- id: CCC.RDMS.TH02
title: Unauthorized cross organization snapshot collection
description: |
A threat actor initiates a snapshot collection activity using a privileged role
and copies the snapshot outside of the organization, which allows for data exfiltration and theft.
A threat actor initiates a snapshot collection activity using
a privileged role and copies the snapshot outside of the
organization, which allows for data exfiltration and theft.
features:
- CCC.F11 # Backup
- CCC.F12 # Recovery
Expand All @@ -40,8 +42,9 @@ threats:
- id: CCC.RDMS.TH03
title: Disabled logging & monitoring
description: |
A threat actor disables the logging and monitoring of the relational database,
which allows evasion and removes traces of malicious actions.
A threat actor disables the logging and monitoring of the
relational database, which allows evasion and removes
traces of malicious actions.
features:
- CCC.F10 # Logging
- CCC.F09 # Monitoring
Expand All @@ -51,7 +54,9 @@ threats:

- id: CCC.RDMS.TH04
title: Unauthorized configuration modification
description: A threat actor attempts to make changes to the configuration of the cloud RDMS with a malicious role.
description: |
A threat actor attempts to make changes to the
configuration of the cloud RDMS with a malicious role.
features:
- CCC.RDMS.F01 # SQL Support
- CCC.F06 # Identity Based Access Control
Expand Down Expand Up @@ -94,7 +99,9 @@ threats:

- id: CCC.RDMS.TH14
title: DB backup is uninentionally restored
description: A threat actor restores a database backup thereby destroying data.
description: |
A threat actor restores a database backup thereby
destroying data.
features:
- CCC.F11
mitre_technique:
Expand All @@ -114,7 +121,8 @@ threats:
- id: CCC.RDMS.TH16
title: Database backups stopped
description: |
Threat actor stops database backups from occuring to inhibit system recovery.
Threat actor stops database backups from occuring to inhibit
system recovery.
features:
- CCC.F11
mitre_technique:
Expand Down
Loading