Skip to content

Commit fd93199

Browse files
committed
Renive control statements from policies
1 parent 39efa62 commit fd93199

4 files changed

Lines changed: 0 additions & 122 deletions

File tree

policies/gh_org_mfa_enabled.rego

Lines changed: 0 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -7,41 +7,3 @@ violation[{}] if {
77
title := "Two Factor Authentication is required at an organization level"
88
description := "Two factor authentication should be enabled and enforced for all users within the Github Organization to make it harder for malicious actors to gain access to the organizations settings and repositories & settings"
99
remarks := "More information from Github can be found here: https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/requiring-two-factor-authentication-in-your-organization"
10-
11-
controls := [
12-
# SAMA Cyber Security Framework v1.0
13-
# https://rulebook.sama.gov.sa/en/cyber-security-framework-2
14-
# Class: SAMA_CSF_1.0
15-
#
16-
# 3.3: Cyber Security Operations and Technology
17-
# https://rulebook.sama.gov.sa/en/33-cyber-security-operations-and-technology-0
18-
{
19-
"class": "SAMA_CSF_1.0",
20-
"control-id": "3.3.5", # Identity and Access Management https://rulebook.sama.gov.sa/en/335-identity-and-access-management-0
21-
"statement-ids": [
22-
"4.e",
23-
"f.1.a",
24-
]
25-
},
26-
27-
# NIST SP 800-53 v5.1.1
28-
# https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
29-
# Class SP800-53-enhancement
30-
# ia: Identification and Authentication
31-
{
32-
"class": "SP800-53-enhancement",
33-
"control-id": "ia-2.1", # Multi-factor Authentication to Privileged Accounts
34-
},
35-
{
36-
"class": "SP800-53-enhancement",
37-
"control-id": "ia-2.2", # Multi-factor Authentication for Non-privileged Accounts
38-
},
39-
{
40-
"class": "OWASP_DSOMM_3",
41-
"control-id": "IM-3.10",
42-
},
43-
{
44-
"class": "OWASP_DSOMM_3",
45-
"control-id": "IM-3.11",
46-
},
47-
]

policies/gh_org_public_repos.rego

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,3 @@ violation[{}] if {
1515

1616
title := "No Public Repos or Gists"
1717
description := "The Organization should not have any public repositories or gists attached to it"
18-
19-
# No direct controls in the frameworks at the moment
20-
# But will be useful when we are mapping ISO 27001, data privacy or custom
21-
# IPR frameworks generated either as a standard or a custom catalog
22-
controls := []

policies/gh_org_secret_dependabot_alerts.rego

Lines changed: 0 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -7,42 +7,3 @@ violation[{}] if {
77
title := "Dependabot alerts enabled for new repositories"
88
description := "All new repositories should be set up to alert for any dependabot alerts that are coming from the repositories"
99
remarks := "Endpoint is closing down at some point and moving to code security configurations: See https://docs.github.com/rest/code-security/configurations"
10-
11-
controls := [
12-
{
13-
"class": "SP800-53-enhancement",
14-
"control-id": "ra-5.4", # Discoverable Information
15-
},
16-
{
17-
"class": "SP800-218",
18-
"control-id": "RV-1.1",
19-
},
20-
{
21-
"class": "SP800-218",
22-
"control-id": "PW-1.3"
23-
},
24-
{
25-
"class": "SP800-218",
26-
"control-id": "PW-5.1"
27-
},
28-
{
29-
"class": "SP800-218",
30-
"control-id": "PW-8.2"
31-
},
32-
{
33-
"class": "OWASP_DSOMM_3",
34-
"control-id": "IG-3.3",
35-
},
36-
{
37-
"class": "OWASP_DSOMM_3",
38-
"control-id": "IG-3.4",
39-
},
40-
{
41-
"class": "OWASP_DSOMM_3",
42-
"control-id": "IG-2.5",
43-
},
44-
{
45-
"class": "OWASP_DSOMM_3",
46-
"control-id": "TV-6.3",
47-
},
48-
]

policies/gh_org_secret_scanning_enabled.rego

Lines changed: 0 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -7,43 +7,3 @@ violation[{}] if {
77
title := "Secret Scanning is enabled for new repositories in the organization"
88
description := "All new repositories should be set up for secret scanning as the default."
99
remarks := "Endpoint is closing down at some point and moving to code security configurations: See https://docs.github.com/rest/code-security/configurations"
10-
11-
controls := [
12-
# OWASP DSOMM v3
13-
# https://dsomm.owasp.org/
14-
# Class: OWASP_DSOMM_3
15-
#
16-
# TV: Test and Verification
17-
{
18-
"class": "SAMA_CSF_1.0",
19-
"control-id": "TV-6.8", # Test for stored secrets https://dsomm.owasp.org/activity-description?uuid=c6e3c812-56e2-41b0-ae01-b7afc41a004c&dimension=Test%20and%20Verification&subDimension=Static%20depth%20for%20infrastructure&level=1&activityName=Test%20for%20stored%20secrets
20-
21-
"statement-ids": [
22-
"TV-6.8_statement"
23-
]
24-
},
25-
{
26-
"class": "SP800-218",
27-
"control-id": "RV-1.1"
28-
},
29-
{
30-
"class": "SP800-218",
31-
"control-id": "PW-1.3"
32-
},
33-
{
34-
"class": "SP800-218",
35-
"control-id": "PW-5.1"
36-
},
37-
{
38-
"class": "SP800-218",
39-
"control-id": "PW-8.2"
40-
},
41-
{
42-
"class": "OWASP_DSOMM_3",
43-
"control-id": "IG-2.5",
44-
},
45-
{
46-
"class": "OWASP_DSOMM_3",
47-
"control-id": "TV-6.8",
48-
},
49-
]

0 commit comments

Comments
 (0)