Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: add the DevSecOps report #76

Merged
merged 7 commits into from
Feb 28, 2024
Merged

docs: add the DevSecOps report #76

merged 7 commits into from
Feb 28, 2024

Conversation

Kuruyia
Copy link
Collaborator

@Kuruyia Kuruyia commented Feb 24, 2024

This adds the LaTeX report for the DevSecOps course.

@Kuruyia Kuruyia added the enhancement New feature or request label Feb 24, 2024
@Kuruyia Kuruyia self-assigned this Feb 24, 2024
@Kuruyia Kuruyia marked this pull request as ready for review February 27, 2024 10:52
docs/devsecops/DevSecOps.tex Outdated Show resolved Hide resolved
docs/devsecops/DevSecOps.tex Outdated Show resolved Hide resolved
docs/devsecops/DevSecOps.tex Outdated Show resolved Hide resolved
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the arrows should begin from the entity that initiates the connection.

Examples:

  • Job service --> NATS (instead of Job service <-- NATS)
  • Mobile app --> Keycloak (instead of Mobile app <-- Keycloak)

Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

docs/devsecops/DevSecOps.tex Outdated Show resolved Hide resolved
\hline
Backend pods & Man-in-the-middle & Privilege escalation & A man-in-the-middle attack is a form of cyberattack where an unauthorized third party intercepts and possibly alters communication between two parties without their knowledge or consent. & Since the API uses HTTPS, and if the machine of the user is not compromised, it is not possible to tamper with the traffic in a useful manner because it is encrypted. \\
\hline
API Gateway & JWT spoofing & Spoofing & JWT spoofing is the deceptive practice of forging or altering JSON Web Tokens to impersonate legitimate users or gain unauthorized access to systems and resources. & Since our authentication token only lasts 5 minutes, we limit the time someone who stole a token can impersonate. \\
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is the wrong mitigation explanation for this kind of attack:

Suggested change
API Gateway & JWT spoofing & Spoofing & JWT spoofing is the deceptive practice of forging or altering JSON Web Tokens to impersonate legitimate users or gain unauthorized access to systems and resources. & Since our authentication token only lasts 5 minutes, we limit the time someone who stole a token can impersonate. \\
API Gateway & JWT spoofing & Spoofing & JWT spoofing is the deceptive practice of forging or altering JSON Web Tokens to impersonate legitimate users or gain unauthorized access to systems and resources. & Our OIDC access token is signed by Keycloak, and the API gateway checks that the signature is correct on the token provided by the user. Therefore, this kind of attack is not possible. \\

Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@thomas-mauran thomas-mauran merged commit 26a75a2 into main Feb 28, 2024
6 checks passed
@Kuruyia Kuruyia deleted the docs/devsecops branch February 29, 2024 17:24
@Kuruyia Kuruyia added documentation Improvements or additions to documentation and removed enhancement New feature or request labels Feb 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants