CDP 35948474: Environment Access (app) #5
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948474Category: Least Privileged Access
Frequency: Annually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Least Privileged Access Requirement: Logically separate access between environments (e.g. dev/test/prod) so that an individual can be granted access to one environment without being able to access others. Guidance: Confirm that access IDs used for different environments such as development, testing, production is logically separated so an individual should not be granted access to other environments(e.g. test or prod) from current working environment(e.g. dev). Additional information can be found on CDP website Least Privileged Access
CapaKraken Action Plan — 35948474 Environment Access Segregation
Scope: Dev / Test / Prod logisch getrennte Zugänge (ein User darf nicht automatisch auf prod zugreifen wenn er dev hat).
Aktueller Stand:
docker-compose.yml,docker-compose.prod.yml, CITodos:
NEXT_PUBLIC_ENV) klar an.env.productionund.env.examplestrikt getrennt dokumentierendocs/environment-segregation.md(neu)Dateien:
docker-compose.yml/docker-compose.prod.yml/docker-compose.ci.ymlCapaKraken Compliance-Status
EAPPS-Mapping:
3.2.3.03Status: ✅ OK (laut
docs/acn-security-compliance-status.md)Zusammenfassung
Dev/Test/Prod sind logisch getrennt über separate
DATABASE_URL, Docker-Compose-Profiles und fiktive Seed-Daten. Ein User mit Dev-Zugang hat nicht automatisch Prod-Zugang (separate User-Tabellen pro DB).Nachweis
docker-compose.yml(dev) vs.docker-compose.prod.ymlpackages/db/prisma/dev-seed.sqlEntscheidung: Control ist nachweislich erfüllt → Ticket wird geschlossen.