Skip to content

Commit fa58665

Browse files
wandmagiciMichaela
authored andcommitted
update file-names & oscal versions
1 parent 7ee639f commit fa58665

File tree

6 files changed

+311
-195
lines changed

6 files changed

+311
-195
lines changed
Lines changed: 198 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,198 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<plan-of-action-and-milestones
3+
uuid="714210d2-f8df-448c-be3e-e2213816cf79"
4+
xmlns="http://csrc.nist.gov/ns/oscal/1.0">
5+
<metadata>
6+
<title>IFA GoodRead Plan of Action and Milestones</title>
7+
<last-modified>2024-02-01T13:57:28.355446-04:00</last-modified>
8+
<version>1.1</version>
9+
<oscal-version>1.1.2</oscal-version>
10+
</metadata>
11+
<import-ssp href="../5-authorize/ssp.oscal.xml" />
12+
<system-id identifier-type="http://ietf.org/rfc/rfc4122">8101e04d-8305-4e73-bb95-6b59f645b143</system-id>
13+
<observation uuid="0c4de4fc-9bde-46af-b6fe-3b5e78194dcf">
14+
<title>Django Framework Examination</title>
15+
<description>
16+
<p>Examine Django Framework for least privilege design and implementation.</p>
17+
</description>
18+
<method>EXAMINE</method>
19+
<type>control-objective</type>
20+
<subject subject-uuid="551b9706-d6a4-4d25-8207-f2ccec548b89" type="component" />
21+
<collected>2023-05-19T12:14:16-04:00</collected>
22+
<remarks>
23+
<p>The assessor attempted to access the admin panel while logged into the GoodRead
24+
application as a PAO staff user. They were able to see the admin panel and directly
25+
edit database records for the application using the Django Framework's admin panel.</p>
26+
</remarks>
27+
</observation>
28+
<observation uuid="8807eb6e-0c05-43bc-8438-799739615e34">
29+
<title>AwesomeCloud IAM Roles Test - GoodRead System Engineer Role</title>
30+
<description>
31+
<p>Test AwesomeCloud IAM Roles for least privilege design and implementation.</p>
32+
</description>
33+
<method>TEST</method>
34+
<type>finding</type>
35+
<subject subject-uuid="551b9706-d6a4-4d25-8207-f2ccec548b89" type="component" />
36+
<collected>2023-06-02T08:31:20-04:00</collected>
37+
<expires>2023-07-01T00:00:00-04:00</expires>
38+
<remarks>
39+
<p>The assessor's security automation platform analyzed all roles specific to the
40+
GoodRead Product Team, not those managed by the Office of Information Technology.
41+
The <code>IFA-GoodRead-SystemEnginer</code> role in their respective AwesomeCloud
42+
account permitted use of the following high-risk actions.</p>
43+
<ul>
44+
<li>awesomecloud:auditlog:DeleteAccountAuditLog</li>
45+
<li>awesomecloud:secmon:AdministerConfigurations</li>
46+
</ul>
47+
<p>Both of these actions are overly permissive and not appropriate for the business
48+
function of the staff member assigned this role.</p>
49+
</remarks>
50+
</observation>
51+
<risk uuid="8b8bae66-b28c-4fa5-9a20-b79e7322fc00">
52+
<title>IFA-GOODREAD-RISK-1: PAO Staff Have Over-Privileged Access to GoodRead System</title>
53+
<description>
54+
<p>A user with the privileges of a PAO staff user can exceed the intended privileges for
55+
their related business function and directly edit the database for the GoodRead
56+
application.</p>
57+
</description>
58+
<statement>
59+
<p>An account without proper least privilege design and implementation can be used to
60+
significantly damage links created by the tool for use by public citizens,
61+
potentially causing a national outage. If an outage were to occur, IFA and
62+
Government policy will require the CIO of the agency to notify the Department of
63+
Homeland Security and the public.</p>
64+
<p>Such an event will cause significant financial and reputational risk to IFA's
65+
Administrator, executive staff, and the agency overall.</p>
66+
</statement>
67+
<status>deviation-approved</status>
68+
<characterization>
69+
<origin>
70+
<actor type="party" actor-uuid="e7730080-71ce-4b20-bec4-84f33136fd58" />
71+
</origin>
72+
<facet name="likelihood" value="low" system="https://ifa.gov/division/ociso/sca" />
73+
<facet name="impact" value="high" system="https://ifa.gov/division/ociso/sca" />
74+
</characterization>
75+
<mitigating-factor uuid="401c15c9-ad6b-4d4a-a591-7d53a3abb3b6">
76+
<description>
77+
<p>The GoodRead application is designed and implemented to only allow access to the
78+
administrative functions for those with PAO staff fole via the VPN via network
79+
configuration between the IFA Enterprise Support Systems and the GoodRead
80+
AwesomeCloud account. Additionally, the load balanacer configuration only allows
81+
access to view shortlinks from the public internet.</p>
82+
</description>
83+
</mitigating-factor>
84+
<deadline>2024-01-01T05:00:00-04:00</deadline>
85+
<response uuid="d28873f7-0a45-476d-9cd3-1d2ec0b8bca1" lifecycle="planned">
86+
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response</title>
87+
<description>
88+
<p>The GoodRead Product Team does not have sufficient personnel and budget to
89+
implement the required changes in their use of the Django Framework and its
90+
configuration in this quarter. With the consultation of the ISSO and the
91+
assessor, the owner of the GoodRead system has decided to accept this risk until
92+
the end of December 2023. From September to December, budget will be available
93+
for the Good Read Product Team's developer and system engineer to completely
94+
disable the functionality that is the source of the risk and its originating
95+
finding.</p>
96+
</description>
97+
<prop name="type" value="accept" />
98+
<task uuid="f8b1d4cb-d1a9-4932-9859-2e93b325f287" type="milestone">
99+
<title>End of Year Project Management Report of Developed Remediations</title>
100+
<description>
101+
<p>The owner, ISSO, and product team of the GoodRead Project intend to complete
102+
the necessary development between September 2023 and December 2023. Whether
103+
or not the necessary development for remedation is complete, the product
104+
team's project manager will submit the final annual report. They will
105+
identify this work item and whether it has been completed.</p>
106+
</description>
107+
<timing>
108+
<within-date-range start="2023-09-29T09:00:00-04:00"
109+
end="2024-01-01T05:00:00-04:00" />
110+
</timing>
111+
</task>
112+
</response>
113+
<related-observation observation-uuid="0c4de4fc-9bde-46af-b6fe-3b5e78194dcf" />
114+
</risk>
115+
<risk uuid="1c65d2d3-7735-47fa-8f68-a236744beab7">
116+
<title>IFA-GOODREAD-RISK-2: GoodRead System Engineers Have Over-Privileged Access to Cloud
117+
Infrastructure Account</title>
118+
<description>
119+
<p>A user in the GoodRead cloud environment with the privileges of a system engineer can
120+
exceed the intended privileges for their related business function. They can delete
121+
all historical audit records and remove important security monitoring functions for
122+
the IFA Security Operations Center staff.</p>
123+
</description>
124+
<statement>
125+
<p>An account without proper least privilege design and implementation can be used to
126+
surreptitiously add, change, or delete cloud infrastructure to the too managing all
127+
links to IFA's communication to public citizens, potentially causing significant
128+
harm with no forensic evidence to recover the system. Regardless of the extent and
129+
duration of a potential incident, such a configuration greatly increases the risk of
130+
an insider threat if there were likely to a potential insider threat in the GoodRead
131+
Product Team.</p>
132+
<p>If such an insider threat existed and acted with this misconfigruatio, the resulting
133+
event could cause significant financial and reputational risk to IFA's
134+
Administrator, executive staff, and the agency overall.</p>
135+
</statement>
136+
<status>open</status>
137+
<characterization>
138+
<origin>
139+
<actor type="party" actor-uuid="e7730080-71ce-4b20-bec4-84f33136fd58" />
140+
</origin>
141+
<facet name="likelihood" value="low" system="https://ifa.gov/division/ociso/sca" />
142+
<facet name="impact" value="high" system="https://ifa.gov/division/ociso/sca" />
143+
</characterization>
144+
<deadline>2023-06-23T17:00:00-04:00</deadline>
145+
<response uuid="4676b126-ba6d-40cc-9dc8-f2aa677b03ee" lifecycle="planned">
146+
<title>IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response</title>
147+
<description>
148+
<p>The GoodRead Product Team does not have siginficant mitigations or compensating
149+
controls to counter this risk, even if likelihood is low. The IFA CISO has cited
150+
ongoing guidance that potential insider threat risks be prioritized above
151+
alternative categories of risk for this quarter. Additionally, there is
152+
sufficient budget and unallocated time for the GoodRead and Office of
153+
Information Technology system engineers to modify AwesomeCloud IAM roles on or
154+
before the next continuous monitoring cycle beginning in July 2023. The planned
155+
completion data is June 23, 2023.</p>
156+
</description>
157+
<prop name="type" value="mitigate" />
158+
<task uuid="a0bb457d-0d14-4a74-801a-ffc9bc4cd636" type="milestone">
159+
<title>Completion of GoodRead Sprint Ending June 23, 2023</title>
160+
<description>
161+
<p>The owner, ISSO, and product team of the GoodRead Project intend to complete
162+
the necessary development by June 23. 2023, the last day of the coinciding
163+
sprint. Whether or not the necessary development for mitigation is complete,
164+
the product team's project manager will write a brief at the end of the
165+
sprint to thw owner and ISSO of this system with the final status and
166+
determination of this work item in this sprint.</p>
167+
</description>
168+
<timing>
169+
<within-date-range start="2023-06-03T00:00:00-04:00"
170+
end="2024-06-23T17:00:00-04:00" />
171+
</timing>
172+
</task>
173+
</response>
174+
<related-observation observation-uuid="8807eb6e-0c05-43bc-8438-799739615e34" />
175+
</risk>
176+
<poam-item uuid="e174dfb9-0ae3-4a8f-8e7c-081527b84337">
177+
<title>Update Django Framework Configuration to Disable Default Admin Panel</title>
178+
<description>
179+
<p>Budget and technical staff are needed to re-design and re-implement a part of the
180+
GoodRead application's use of a web appplication programming framework to mitigate
181+
the risk of low privilege users directly modifying the database of this application.
182+
This application is a high-visibility service and integral to future operations of
183+
the IFA Office of Public Affairs and its staff.</p>
184+
</description>
185+
<related-observation observation-uuid="0c4de4fc-9bde-46af-b6fe-3b5e78194dcf" />
186+
<associated-risk risk-uuid="401c15c9-ad6b-4d4a-a591-7d53a3abb3b6" />
187+
</poam-item>
188+
<poam-item uuid="48c8368d-43ff-4736-9b28-64b1b1284c03">
189+
<title>GoodRead System Engineers Have Over-Privileged Access to Cloud Infrastructure Account</title>
190+
<description>
191+
<p>Budget and technical staff allocation are available and designated to fix a
192+
misconfiguration of the IAM roles for members of the GoodRead Product Team in their
193+
AwesomeCloud account to implement least privilege as designed.</p>
194+
</description>
195+
<related-observation observation-uuid="8807eb6e-0c05-43bc-8438-799739615e34" />
196+
<associated-risk risk-uuid="1c65d2d3-7735-47fa-8f68-a236744beab7" />
197+
</poam-item>
198+
</plan-of-action-and-milestones>

0 commit comments

Comments
 (0)