CDP Compliance Epic — alle Controls #1
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Compliance Epic
Umbrella-Ticket für alle CDP Controls aus
samples/CDP/Copy of CDP_Controls_Export_KapaKraken.xls.docs/acn-security-compliance-status.md— CapaKraken ist laut internem Status zu 73 % OK gegenüber der Accenture Application Security Standard V7.30Anwendbare Controls (20)
35948467Application ID (app/AI)35948468Provide Written Notification (app)35948474Environment Access (app)35948473Implement Patching Process (app/AI)35948472Maintain current application inventory (dev)35948452Confirm Uniqueness of IDs and Passwords (app/AI)35948471Deliver project specific CDP training (app/AI)35948470Segregation of Duty Access (app)35948455Provide Role Related Access (app)35948458Require Multi-Factor Authentication35948454Maintain System Administrator Log (app)35948464General35948466Enable Logging (app)35948469Designate SPOC for Sharing Information (app/AI)35948520Web Application35948517ReactJs35948515HTML535948519Utilize a Secure DevOps environment supporting code scanning services35948518Cloud35948516NodeJSNicht anwendbar (9) — geschlossen
#4—35948462Confirm Business Continuity contractual requirements (app/AI)#8—35948459Log Chain of Custody (app/AI)#11—35948457Encrypt Transmission of Client Data via Mobile (app/AI)#16—35948456Require Reputable Courier for Third Party Transport (app/AI)#18—35948465Establish Firefighter ID Activation Procedure (app)#20—35948463Mobilize subcontracting entities in CDP plan (app/AI)#21—35948453Firefighter Activity Logging (app)#22—35948461Business Need Approval (app)#23—35948460Firefighter ID Password Change (app)Web Application Detail-Checklisten (73 Checks)
Ergänzende Accenture CDP-Detailchecks aus
samples/CDP/checklists/, thematisch zu den Technologie-Controls gruppiert:Progress Update — 2026-04-16
Controls-Status
Anwendbare Controls (20):
#2#5#9#12#13#14#15#19#26#27#29#30Detail-Checklisten (73 Checks)
#32Cloud → N/A (on-prem).#33HTML5 → 100 % OK.#34Node.js → 100 % OK.#35ReactJs → 100 % OK.Summary
Nächste Schritte
Full-Codebase Security Audit — 2026-04-16
Systematischer Audit des gesamten Source-Codes (nicht nur der CDP-Standard-Controls) hat 60 Findings ergeben, konsolidiert zu 23 actionable Tickets. Alle haben konkrete File-Pfade, Zeilen-Evidenz und copy-paste-baren Fix-Vorschläge.
Methode
3 parallele Audit-Agents mit strikten Scopes:
Jedes Finding mit realistischem Exploit-Path; theoretische Probleme wurden gefiltert.
Neue Tickets
🔴 CRITICAL (2)
🟠 HIGH (13)
/api/*— new routes inherit public access*.openai.com,*.azure.com),unsafe-inlinestyles, SVG routes skip CSP🟡 MEDIUM (8)
.max()audit — 202 unboundedz.string()sitesNicht-Duplikate — diese Findings waren noch NICHT durch existierende Tickets gecovert
Existierende Tickets #25/#26/#27/#29/#30/#31 + Checklisten decken die Accenture-CDP-Standard-Kontrollen ab.
Die 23 neuen Tickets behandeln konkrete Code-Level-Probleme, die beim Standard-Checklisten-Audit typischerweise durch das Raster fallen (z. B. Timing-Attacks, Prompt-Injection-Bypass, Docker-Secret-Handling, SSRF-IPv6).
Compliance-Prognose
Nach Abarbeitung der neuen Tickets erwartet:
Empfohlene Reihenfolge
Audit-Artefakte