Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Suggestion] Map usecases.md Users to OSCAL #423

Closed
sunstonesecure-robert opened this issue Sep 23, 2020 · 14 comments
Closed

[Suggestion] Map usecases.md Users to OSCAL #423

sunstonesecure-robert opened this issue Sep 23, 2020 · 14 comments
Labels
inactive No activity on issue/PR policy policy related topics suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category

Comments

@sunstonesecure-robert
Copy link
Contributor

sunstonesecure-robert commented Sep 23, 2020

Description: What's your idea?

OSCAL has a schema definition in the SSP/implementation layer for User:

https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/ssp/json-schema/#user

and responsible roles:

https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/ssp/xml-schema/#global_responsible-role

Map the suggested personas here to OSCAL definitions

Note: these are not 1:1 mappings but possibly n:m

  • Operators: Enterprise, Quota, Network => asset-administrator, network-operations
  • Administrators: Security, Compliance/Audit = asset-administrator, asset-owner, security-operations, incident-response
  • Developers, including Third Party Security Products => configuration-management, maintainer
  • End-users => user, help-desk, security-operations, incident-response, asset-owner
  • Platform Implementers => provider, maintainer, asset-owner

In addition cloud IAM platforms have lots of "predefined" roles which map to human level responsibilities, and generally map to resource read, write, or some action (eg. execute or similar):
https://cloud.google.com/iam/docs/understanding-roles#predefined_roles
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html

Impact: Describe your hopes for how this would reduce risk for the cloud native ecosystem. Who will this help? How will it help them?

Provide a reusable and reviewable definition of user <-> role <-> responsibility types so that relevant permissions that can be forward engineered, reverse engineered and reviewed, version controlled, composed, verified, tested and reused.

Once these definitions have achieved consensus agreement, the concrete deliverable would be to oncorporate this into the whitepaper and map efforts. Then possibly in the future into specific tooling, eg. policy definition and assessment/enforcement tools.

Scope: How much effort will this take? ok to provide a range of options if or "not yet determined"

  • 1 day for initial strawman, 7-14 calendar days to incorporate feedback
  • 1 day to incorporate consensus definition into whitepaper and mapping documents; 7-14 calendar days to review
  • TBD: incorporating these types into APIs or CRDs or other concrete tooling implementations

Additional info:

@sunstonesecure-robert sunstonesecure-robert added the suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category label Sep 23, 2020
@chasemp
Copy link
Contributor

chasemp commented Nov 12, 2020

This is interesting to me, anything ever come of it?

@sunstonesecure-robert
Copy link
Contributor Author

sunstonesecure-robert commented Nov 12, 2020 via email

@achetal01
Copy link
Contributor

I am interested in contributing to this work stream....
Has the work started and is there a document with more detailed mappings of controls & use cases to OSCAL?

Thanks

@lumjjb
Copy link
Contributor

lumjjb commented Dec 14, 2020

Tagging policy WG folks just to ensure visibility. @hannibalhuang @ericavonb @rficcaglia

@lumjjb lumjjb added the policy policy related topics label Dec 14, 2020
@sunstonesecure-robert
Copy link
Contributor Author

sunstonesecure-robert commented Dec 14, 2020 via email

@TheFoxAtWork
Copy link
Contributor

Wanted to check in here and see if this is worked under the Policy WG or does this need larger involvement?

@rficcaglia
Copy link
Contributor

rficcaglia commented Jan 15, 2021 via email

@TheFoxAtWork
Copy link
Contributor

Awesome ! Would you do a check in on this with the SIG meetings in February? See if we can drum up some others to join in the fun.

@sunstonesecure-robert
Copy link
Contributor Author

sunstonesecure-robert commented Feb 9, 2021

UPDATE: no longer valid link:

~~ just FYI I think newer oscal has modified this to be: ~~
~~ https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/ssp/json-schema/#global_system-user ~~

and now user type is an annotation:

ALLOWED VALUES for system-user/annotation/@name
The value may be locally defined, or one of the following:
type: The type of user, such as internal, external, or general-public.
privilege-level: The user's privilege level within the system, such as privileged, non-privileged, no-logical-access.

so I think the specific task here would be to define the type values for system-user

The PolicyReport CRD doesn't have any definition of user, there would need to be one. I can raise it at the next discussion - of note it is a member of the assessment-results oscal schema. We did discuss also having a component implementation - and system-user is also a member of that schema

@david-waltermire
Copy link

I am the Technical Director for the OSCAL project. I would be happy to talk with you about this use case if you have any questions. We can chat on the OSCAL Gitter. There is also a bi-weekly OSCAL Lunch with the Devs where we talk about use of models. Perhaps we could touch base there? The next one is on 2/25.

@stale
Copy link

stale bot commented May 22, 2021

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label May 22, 2021
@sunstonesecure-robert
Copy link
Contributor Author

I also think NICE Framework may be pertinent to this effort.

@stale stale bot removed the inactive No activity on issue/PR label Jul 29, 2021
@stale
Copy link

stale bot commented Sep 28, 2021

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label Sep 28, 2021
@anvega
Copy link
Contributor

anvega commented Jun 20, 2023

Closing this given the https://github.com/cncf/tag-security/blob/main/cloud-native-controls/phase-one-announcement.md was produced. If users were out of scope, will leave it to the determination of that working group to expand upon.

@anvega anvega closed this as completed Jun 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
inactive No activity on issue/PR policy policy related topics suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category
Projects
None yet
Development

No branches or pull requests

8 participants