Implementation -> Infrastructure Hardening: Filter outcoing traffic
Risk and Opportunity
Risk: A compromised infrastructure component might try to send out stolen data.
Opportunity: Having a whitelist and explizitly allowing egress traffic provides the ability to stop unauthorized data leackage.
Required knowledge: Medium (two disciplines)
Required time: Medium
Required resources (systems): Medium
- Open Policy Agent
OWASP SAMM 2 Mapping: o-environment-management|A|1
ISO27001:2017 Controls Mapping:
- virtual environments are not explicitly covered by ISO 27001 - too specific