Fork me on GitHub

Build and Deployment -> Deployment: Inventory of running artifacts

Risk and Opportunity

Risk: In case a vulnerability of severity high or critical exists, it needs to be known where an artifacts with that vulnerability is deployed with which dependencies.

Exploit details

Usefullness: Medium
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low

Additional Information

Dependencies: Defined deployment process
Implementation hints: Kubernetes Admission Controller can whitelist registries and/or whitelist a signing key.
OWASP SAMM 2 Mapping: o-incident-management|TODO