-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Ability to record the status of threats #126
Comments
The following is a combined proposal for both the ask for Mitigation status (#61) and Threat status (#126) given the interplay between them. Ask: @arivra for your feedback (and anyone else reading this) on if the below proposal would address your use case. Broad design philosophy and decisionsWe propose the tool will:
Threat statusMental model
Proposed statuses
UI placement
Business logic
Dashboard
Mitigation statusMental model
Proposed statuses
UI placement
Business logic
Dashboard
|
Overall, this proposal seems reasonable to me. One comment is that I do think that the dashboard could flag threats that are marked Resolved (either Resolved or NotUseful) when one more of the mitigations associated with the threats is/are still in Identified or InProgress (i.e. not all associations are in either Resolved or Abandoned). My logic here is that if there is a mitigation identified - then it should be dispatched/considered/reasoned-about enough to get it to Resolved or Abandoned before treating the threat as Resolved. As another consideration - you could consider noting in the dashboard any mitigations that are not Abandoned and associated with threats that are marked NotUseful. This might point to work or potential work that could be avoided (save time, money). I realize that this is probably an UNcommon situation but figured I'd mention it. |
Thank you so much @dboyd13 If I have understood correctly, the proposal you indicate would include a dict with "key": "Status" as a new element in the "metadata" list and with three possible "value": threatIdentified, threatResolved or threatResolvedNotUseful.
It would perfectly cover what was requested, except for the accepted risk part, but it is not a problem because I could cover it by putting a label that would be taken into account when "Status" had the value "threatResolved", and I think that when it is put in, the justification in "Comments" would be filled in. I understand what you say in:
but what I am looking for is precisely for those grey threats and for accountability. Also, what I understand is that there would be constants for the labels that could change, so based on the initial proposal it could be:
That's right, isn't it? |
Thanks @arivra
The possible values you've listed is correct. What we have not decided on is if the status should be a key/value pair under
Acknowledged, and agree that tagging (or label as you referred to it) together with commentary within the comments field is a suitable way forward that should work in your scenario, and other users with custom needs.
Yes, there will be constants for status within the Overall my impression is that you are satisfied with this proposal, is that correct? |
Thanks @climbertjh2
Both good suggestions. Thank you. |
Both options are good, although removing it from the 'metadata' saves us a click to open the metadata dropdown, so it is probably better to leave it out of 'metadata'.
Yes, that's correct, thank you @dboyd13 ! |
🎉 This issue has been resolved in version 1.0.57 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Describe the feature
I would like to be able to capture the status of any threats that are documented within threat composer
Use Case
We would like to track threats that are identified during modeling. To do this, we want to bring these threats to Defect Dojo (it's like an ASPM or defect repository) as defects of a product. Our idea is to make a Defect Dojo parser that reads the threat-composer json and creates as many defects as there are detected threats. The mapping would be more or less:
To know if a threat, and therefore a defect, has been mitigated (or not) we need its status.
Proposed Solution
Add a new "Status" field against each threat with the following values:
Other Information
I don't think there should be a direct relationship between the status of the mitigations and the status of the threat. It could be that even if the mitigations were implemented, the entire threat would not be covered.
Acknowledgements
The text was updated successfully, but these errors were encountered: