Definitions within environments to investigate
Classes of threats
- External generic -
- i.e script kiddies, without folio-specific knowledge
- "Bad user" -
- has a folio account and password. Either leaked account/password or evil user
- Internal non-folio -
- has access to (parts of) folio network but no account
- non-malicious -
- i.e Ooops- script or command. User with foilo-account that had bad luck when thinking
- External generic -
Classes of networks
- Public net
This is associated with the public internet, external IPs - Internals net(s)
- Might be divided in:
- FOLIO internal network with OKAPI as managing "proxy"
- separate network for secondary services (might be optional)
- Might be divided in:
- Diagram might be very helpful!
- Public net
Classes of FOLIO services
- FOLIO Backend modules
- FOLIO permission/managing service - OKAPI
- Secondary services
- Kafka
- Elastic Search
- Database
- FOLIO-Reporting?
- Monitoring?
- Diagram might be very helpful!
Classes of tools to explore
- webservers / proxies
- firewalls
- treat/suspicous traffic detection services (log scanning eg. elastic search)
- others?
Scope
- start with API
- later: UI
- later: secondary services (Kafka, Elastic Search, Database etc.)
Out of scope
- Bringing down / securing secondary services
Several stages of aproach
- Investigation → stories and (ab)use cases
- Matrix of cases to explore
- eg. bringing down Okapi
- clause of from external network
- clause from internal net to bring down modules directly
- Defining test case/environments
- Creating test environment and verifying
- Outcome should be a documentation → no need to specify this on at this stage