You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to satisfy the requirements of NIST 800-53 Rev4 SI-3 for data.gov components running in cloud.gov, the data.gov team wants to achieve malicious code detection at the application instance level by implementing a malware-detection sidecar buildpack.
Acceptance Criteria
GIVEN an application deployed to cloud.gov that includes a malware-detection buildpack
WHEN we trigger the signature update task with cf run-task
THEN we see the malware-detection definitions file get updated in the instance
GIVEN an application deployed to cloud.gov that includes a malware-detection buildpack
WHEN we place the EICAR test file in the application instance
AND we trigger the malware-detection scan with cf run-task
THEN we see detection of the EICAR sample in the application logs
AND we see an alert in the #datagov-alerts Slack channel
Background
Sidecar buildpacks enable the implementation of application level detection of malicious code in Cloud Foundry apps. We should use this capability to fill this compliance gap for data.gov and potentially many other cloud.gov tenants.
A sidecar would be the ideal way to configure Monit+LMD for apps. We can make a malware-detection sidecar buildpack which would enable any team to add this capability just by prepending it to their buildpack list.
Also take the opportunity to evaluate including AIDE or an equivalent in the sidecar to meet the needs of control SI-4(5), making a new issue if needed.
The text was updated successfully, but these errors were encountered:
mogul
changed the title
ClamAV sidecar buildpack for cloud.gov apps
Malware sidecar buildpack for cloud.gov apps
Dec 7, 2020
mogul
changed the title
Malware sidecar buildpack for cloud.gov apps
Malware-detection sidecar buildpack for cloud.gov apps
Dec 7, 2020
adborden
changed the title
Malware-detection sidecar buildpack for cloud.gov apps
[research 3d]: Malware-detection sidecar buildpack for cloud.gov apps
Mar 18, 2021
User Story
In order to satisfy the requirements of NIST 800-53 Rev4 SI-3 for data.gov components running in cloud.gov, the data.gov team wants to achieve malicious code detection at the application instance level by implementing a malware-detection sidecar buildpack.
Acceptance Criteria
WHEN we trigger the signature update task with
cf run-task
THEN we see the malware-detection definitions file get updated in the instance
WHEN we place the EICAR test file in the application instance
AND we trigger the malware-detection scan with
cf run-task
THEN we see detection of the EICAR sample in the application logs
AND we see an alert in the #datagov-alerts Slack channel
Background
Sidecar buildpacks enable the implementation of application level detection of malicious code in Cloud Foundry apps. We should use this capability to fill this compliance gap for data.gov and potentially many other cloud.gov tenants.
Security Considerations (required)
This change implements the description from control SI-3 in the data.gov SSP.
Sketch/options to consider
Options for malware detection:
Try out LMD by hand...
A sidecar would be the ideal way to configure Monit+LMD for apps. We can make a malware-detection sidecar buildpack which would enable any team to add this capability just by prepending it to their buildpack list.
Here's the bare-minimum sidecar buildpack example. Stark and Wayne provided a great sidecar buildpack sample to build upon.
Use Monit to invoke the actual scan and alert the #datagov-alerts channel via email if problems are found.
Also take the opportunity to evaluate including AIDE or an equivalent in the sidecar to meet the needs of control SI-4(5), making a new issue if needed.
Contingency/fallback: Stick with restarting apps every X minutes.
The text was updated successfully, but these errors were encountered: