CDP 35948519: Utilize a Secure DevOps environment supporting code scanning services #28
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948519Category: Secure Application Development
Frequency: Quarterly
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Secure Application Development Requirement: Applications that are being developed in a DevOps environment and a CI/CD (Continuous Integration/Continuous Deployment) pipeline is in place, must be developed in a Secure DevOps environment ensuring continuous scanning throughout the application's development life cycle, allowing developers to identify critical security risks prior to going live. The app development process should include execution of scans as part of the application build remediating all Critical and High findings prior to releasing to customers. Where findings are not remediated, appropriate client sign off must be obtained. Additionally, if the application is a web application, processes/collects regulated personal data, processes >1M records of client data, and/or serves as a credential/password reset system, the application must undergo an application security assessment (ASA) prior to go live to ensure compliance with Accenture application security standards and industry best practices for securing applications. Additional ASAs must be performed if there are any significant changes to the application or with each major release. Attachment(s) Required: Vulnerability and/or application security assessment results Guidance: Secure DevOps - A DevOps environment supporting code scanning services, covering Static analysis (SAST), Dynamic analysis (DAST) and Software Composition Analysis (SCA). All critical/high vulnerabilities should be remediated prior to software release. Tools and services provided by the security team would be chargeable Visit the https://in.accenture.com/protectingaccenture/client-data-protection/cdp-insiders/jobaids/ for job aids.
CapaKraken Action Plan — 35948519 Secure DevOps / CI/CD Scanning
Scope: CI/CD-Pipeline mit Secure-DevOps Practices + continuous scanning (SAST/DAST/SCA).
Aktueller Stand:
docs/acn-security-compliance-status.md3.2.2.7.01 PARTIAL — Dependabot +pnpm auditin CI; kein SAST/DAST Tool0ef9add)Referenz: Intelligent Application Security Platform
Todos (HOCH-Prio laut Compliance-Status offene Items #3):
.github/workflows/sast.yml→ Fail on Critical/Highpnpm audit --audit-level=high(konfigurieren als CI-Gate)Quarterly Control — Scans müssen vierteljährlich Ergebnisse produzieren.
Dateien:
.github/workflows/— neue SAST/DAST WorkflowsCapaKraken Compliance-Status
EAPPS-Mapping:
DevSecOps StandardStatus: 🟡 PARTIAL / TODO — konkrete Schritte unten
Zusammenfassung
CI/CD-Pipeline auf Gitea Actions mit Dependabot +
pnpm audit. SAST/DAST-Tools fehlen (Compliance-Doc TODO, Priorität HOCH).Aktuelle Evidenz
.github/workflows/ci.yml.github/workflows/nightly-security.yml9c537b0Offene Aufgaben
main(PR-Review + Status-Checks pflicht).Ticket bleibt offen bis alle Aufgaben abgehakt sind.
Action Plan
CDP-Requirement: CI/CD-Pipeline muss SAST + DAST + SCA durchführen, Critical/High blocken.
Status — Coverage-Matrix
pnpm audit --audit-level=high.github/workflows/nightly-security.yml, Cron17 2 * * *).github/dependabot.yml)TODO 1 — SAST (hohe Prio)
Empfehlung: CodeQL oder Semgrep in CI ergänzen.
docker run --rm -v $PWD:/src returntocorp/semgrep semgrep --config=p/typescript --config=p/react --config=p/nodejs --error.github/workflows/sast.ymlmit Semgrep-Scan auf PR + main, Fail-on-High/Critical.ci.ymlneeds-Chain, bevor Release-Images pusht.TODO 2 — DAST (mittlere Prio)
Empfehlung: OWASP ZAP Baseline-Scan gegen die
Fresh-Linux Docker Deploy-Instanz.docker-deploy-test-Job →zaproxy/action-baseline@v0.14.0gegenhttp://localhost:3100TODO 3 — ASA (Application Security Assessment)
Regulated/Personal-Data-Scope prüfen:
TODO 4 — Secret-Scanning
Zusätzlich zu Gitea-Default:
gitleakspre-commit-Hook aktivieren (.pre-commit-config.yamloder Husky).Frequency: Quarterly — aktuelle Findings durchgehen.