Skip to content

Commit 4bf1d48

Browse files
authored
Move several requirements out of Lv2 (#206)
* Elevated the maturity on several requirements Signed-off-by: Eddie Knight <[email protected]> * both secure channels requirements are now level 1 Signed-off-by: Eddie Knight <[email protected]> * Updated OSPS-AC requirements Signed-off-by: Eddie Knight <[email protected]> * typofix Signed-off-by: Eddie Knight <[email protected]> --------- Signed-off-by: Eddie Knight <[email protected]>
1 parent fcc7d01 commit 4bf1d48

File tree

5 files changed

+14
-46
lines changed

5 files changed

+14
-46
lines changed

baseline/OSPS-AC.yaml

Lines changed: 13 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ controls:
149149
150150
- id: OSPS-AC-04
151151
title: |
152-
Configure the project's permissions in CI/CD pipelines
152+
Restrict the project's permissions in CI/CD pipelines based on context
153153
objective: |
154154
Reduce the risk of unauthorized access to the project's build and release
155155
processes by limiting the permissions granted to steps within the CI/CD
@@ -180,52 +180,24 @@ controls:
180180
assessment-requirements:
181181
- id: OSPS-AC-04.01
182182
text: |
183-
The project's permissions in CI/CD pipelines MUST be configured to the
184-
lowest available privileges except when explicitly elevated.
183+
The project's settings for CI/CD pipelines MUST restrict permissions
184+
to the lowest available privileges by default.
185185
applicability:
186186
- Maturity Level 2
187187
- Maturity Level 3
188188
recommendation: |
189-
Configure the project's CI/CD pipelines to assign the lowest available
190-
permissions to users and services by default, elevating permissions
191-
only when necessary for specific tasks. In some version control
192-
systems, this may be possible at the organizational or repository
193-
level. If not, set permissions at the top level of the pipeline.
194-
195-
- id: OSPS-AC-05
196-
title: |
197-
Limit the permissions granted to CI/CD pipelines by default
198-
objective: |
199-
Reduce the risk of unauthorized access to the project's build and release
200-
processes by limiting the permissions granted to new CI/CD pipelines.
201-
family: Access Control
202-
mappings:
203-
- reference-id: CRA
204-
identifiers:
205-
- 1.2f
206-
- reference-id: SSDF
207-
identifiers:
208-
- PO3.2
209-
- PS1
210-
- reference-id: CSF
211-
identifiers:
212-
- PR.AA-02
213-
- reference-id: OCRE
214-
identifiers:
215-
- 486-813
216-
- 124-564
217-
- 347-507
218-
- 263-284
219-
- 123-124
220-
assessment-requirements:
221-
- id: OSPS-AC-05.01
189+
Configure the project's settings to assign the lowest available
190+
permissions to new pipelines by default, granting additional
191+
permissions only when necessary for specific tasks.
192+
- id: OSPS-AC-04.02
222193
text: |
223-
The project's CI/CD pipelines MUST restrict permissions to the lowest
224-
available privileges by default.
194+
The project's permission assignments in CI/CD pipelines MUST use the
195+
lowest available privileges except when explicitly elevated.
225196
applicability:
226-
- Maturity Level 2
227197
- Maturity Level 3
228198
recommendation: |
229199
Configure the project's CI/CD pipelines to assign the lowest available
230-
permissions to new pipelines by default, granting additional permissions
231-
only when necessary for specific tasks.
200+
permissions to users and services by default, elevating permissions
201+
only when necessary for specific tasks. In some version control
202+
systems, this may be possible at the organizational or repository
203+
level. If not, set permissions at the top level of the pipeline.

baseline/OSPS-BR.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -294,6 +294,7 @@ controls:
294294
Any websites, API responses or other services involved in release
295295
pipelines MUST be fetched using encrypted channels.
296296
applicability:
297+
- Maturity Level 1
297298
- Maturity Level 2
298299
- Maturity Level 3
299300
recommendation: |

baseline/OSPS-DO.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,6 @@ controls:
143143
expected identity of the person or process authoring the software
144144
release.
145145
applicability:
146-
- Maturity Level 2
147146
- Maturity Level 3
148147
recommendation: |
149148
Instructions in the project should contain information about the
@@ -183,7 +182,6 @@ controls:
183182
The project documentation MUST include a descriptive statement about
184183
the scope and duration of support.
185184
applicability:
186-
- Maturity Level 2
187185
- Maturity Level 3
188186
recommendation: |
189187
In order to communicate the scope and duration of support for the

baseline/OSPS-GV.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,6 @@ controls:
163163
are reviewed prior to granting escalated permissions to sensitive
164164
resources.
165165
applicability:
166-
- Maturity Level 2
167166
- Maturity Level 3
168167
recommendation: |
169168
Publish an enforceable policy in the project documentation that

baseline/OSPS-QA.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,6 @@ controls:
214214
project. Others may be held to a lower standard if they have lower
215215
levels of adoption or are not intended for general use.
216216
217-
218217
- id: OSPS-QA-05
219218
title: |
220219
Remove generated executable artifacts from the version control system
@@ -298,7 +297,6 @@ controls:
298297
The project's documentation MUST clearly document when and how tests
299298
are run.
300299
applicability:
301-
- Maturity Level 2
302300
- Maturity Level 3
303301
recommendation: |
304302
Add a section to the contributing documentation that explains how to

0 commit comments

Comments
 (0)