Skip to content

13.4.6 / v5.0.be-14.1.5 - known good state #2953

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
elarlang opened this issue Apr 12, 2025 · 7 comments
Closed

13.4.6 / v5.0.be-14.1.5 - known good state #2953

elarlang opened this issue Apr 12, 2025 · 7 comments

Comments

@elarlang
Copy link
Collaborator

# Description Level #v5.0.be
13.4.6 Verify that deployed environments are short-lived and frequently redeployed to a "known good" but updated state. Alternatively, long-lived environments must have a "drift prevention" mechanism to ensure that deployed configurations are not changed to an insecure state. 3 v5.0.be-14.1.5

It requires to implement certain solution, but not to address the actual problem that seems to be "ensure that deployed configurations are not changed to an insecure state".

@elarlang elarlang added 1) Discussion ongoing Issue is opened and assigned but no clear proposal yet _5.0 - rc1 V13 (prev V14) labels Apr 12, 2025
@jmanico
Copy link
Member

jmanico commented Apr 12, 2025

I think this is a fair observation. If you want to keep this around, I would suggest we state the first, like:

13.4.6 Verify that the integrity and security posture of deployed environments are maintained over time, ensuring that configurations do not drift to an insecure state. Examples of this include using short-lived environments that are frequently redeployed from a secure baseline ("known good state") or employing drift prevention mechanisms for long-lived environments.

@tghosth
Copy link
Collaborator

tghosth commented Apr 16, 2025

Created #2973 based on @jmanico's proposal

@tghosth tghosth added 6) PR awaiting review and removed 1) Discussion ongoing Issue is opened and assigned but no clear proposal yet labels Apr 16, 2025
@elarlang
Copy link
Collaborator Author

I can merge in the improved wording, but the question is - is it realistic to be tested and verifiable?

@elarlang elarlang added 1) Discussion ongoing Issue is opened and assigned but no clear proposal yet and removed 6) PR awaiting review labels Apr 16, 2025
@elarlang elarlang reopened this Apr 16, 2025
@jmanico
Copy link
Member

jmanico commented Apr 16, 2025

How about this Elar? A more verifiable version might be:

13.4.6 Verify that mechanisms are in place to detect and respond to configuration drift in deployed environments. This may include using immutable infrastructure, automated redeployment from a secure baseline, or drift detection tools that compare current state against approved configurations.

The tools I use for this include:

  • Terraform with drift detection (terraform plan, terraform validate)
  • Immutable infrastructure patterns (e.g., AWS AMIs, containers)
  • Configuration management systems with drift detection (e.g., Chef, Puppet, Ansible, or Kubernetes GitOps tools like ArgoCD or Flux)

@elarlang
Copy link
Collaborator Author

If you both think that this is actionable and verifiable requirement I'm ok to close this out. I don't have enough experience with this to have a strong opinion on the content, just concerns for the requirement in ASVS.

@jmanico
Copy link
Member

jmanico commented Apr 16, 2025

I think a push to make this more verifiable is sensible, I'm happy to modify this more to make it more verifiable. It's a good push.

@tghosth
Copy link
Collaborator

tghosth commented Apr 17, 2025

I like @jmanico's wording so I opened #2980

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants