Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

content: draft: Flesh out "Usage" threat #1191

Open
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

TomHennen
Copy link
Contributor

There are two ways to look at the usage threat:

  1. Can the attacker modify the software being delivered to a consumer.
  2. Can the consumer use the software insecurly allowing an attacker
    to take advantage of that insecurity to exploit them.

IMO 1 has the same solutions as 'G' (PR #1190). I could repeat them
here under usage, but instead I've updated 'G' to include modification
in transit, and I've had 'Usage' address 2 above (albeit by just
deferring to CISA's work in this area).

fixes #1182

NOTE: this PR is based on top of #1190 since the solution presented in 1190 obviates the need for addressing that here.

These threats generally match the threats for 'Artifact Publication' with
the twist that the consumer must do the verification instead.

Consumer verification may be simplified if a VSA was issued at publication time.

fixes slsa-framework#1180

Signed-off-by: Tom Hennen <[email protected]>
Signed-off-by: Tom Hennen <[email protected]>
Signed-off-by: Tom Hennen <[email protected]>
There are two ways to look at the usage threat:

1. Can the attacker modify the software being delivered to a consumer.
2. Can the consumer use the software insecurly allowing an attacker
   to take advantage of that insecurity to exploit them.

IMO 1 has the same solutions as 'G' (PR slsa-framework#1190).  I could repeat them
here under usage, but instead I've updated 'G' to include modification
in transit, and I've had 'Usage' address 2 above (albeit by just
deferring to CISA's work in this area).

fixes slsa-framework#1182

Signed-off-by: Tom Hennen <[email protected]>
Copy link

netlify bot commented Oct 14, 2024

Deploy Preview for slsa ready!

Name Link
🔨 Latest commit 38b1abd
🔍 Latest deploy log https://app.netlify.com/sites/slsa/deploys/670d7d981afff70008f3ff72
😎 Deploy Preview https://deploy-preview-1191--slsa.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@TomHennen
Copy link
Contributor Author

Hey @MarkLodato, if you have time can you take a quick look at 'I' in this PR and double-check my logic? I'd like to make sure I'm not missing anything (or if there's a good reason to include much of 'G' here too).

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: 🆕 New
Development

Successfully merging this pull request may close these issues.

TODO: Need to fill out description of "(I) Usage" in threat and mitigation section
1 participant