CDP 35948470: Segregation of Duty Access (app) #12
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948470Category: Least Privileged Access
Frequency: Biannually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Least Privileged Access Requirement: When assigning responsibilities, apply the concept of segregation of duties so that no individual person has access to perform tasks that could create a security conflict of interest (for example: developer/reviewer; developer/tester).If the project follows an Agile/DevOps arrangement and there are not sufficient resources to fully apply segregation of duties, the following compensating controls must be in place:Automated application vulnerability code scans in repositoriesLeast privilege access (e.g. Developers should not be given privileged rights (e.g. Root access) which can allow them to delete change logs and their access should be strictly controlled and restricted with least privilege access)Audit Logging and Monitoring (Strong Logging and Auditing capabilities should be implemented and change control logs should not be edited by developers and should be thoroughly reviewed to identify any unauthorized changes)Guidance: Confirm that segregation of duties is ensured for all critical activities (e.g.: approval for deployment process; development team does not have deployment privilege). Confirm avoidance of conflict of interest (e.g.: developer and reviewer being the same person). Additional information can be found on CDP website Least Privileged AccessFor teams responsible for implementing Oracle ERP, if controls #2 and #3 are in place and the Oracle ERP checklist has been completed, please contact your CDP account manager for a deviation.
CapaKraken Action Plan — 35948470 Segregation of Duty
Scope: Kein einzelner Entwickler soll Dev + Review + Test + Prod-Deploy allein ausführen können. Bei kleinen Teams: kompensierende Controls.
Aktueller Stand:
Todos (Kompensierende Controls gem. Guidance):
mainBranch ist Merge via Pull Request + CI-Pass zwingend)main: Require PR + CI + keine Direct Pushesdocs/segregation-of-duty.md— warum SoD nicht voll möglich + welche KompensationenDateien:
.github/workflows/*.yml, Gitea Branch Protection SettingsCapaKraken Compliance-Status
EAPPS-Mapping:
3.2.2.3.11Status: ✅ OK (laut
docs/acn-security-compliance-status.md)Zusammenfassung
5-stufiges RBAC (Owner/Admin/Manager/Resource/External) mit per-User
PermissionKey[]-Overrides. Admin-Procedures sind überadminProcedure/requirePermissiongatekeeped.Nachweis
SystemRoleConfig.defaultPermissions+User.permissionOverrides—packages/db/prisma/schema.prisma(siehesystem_role_configs)adminProcedureMiddleware —packages/api/src/router//admin/*nur für Admin-Rollen —apps/web/src/middleware.tsEntscheidung: Control ist nachweislich erfüllt → Ticket wird geschlossen.