Skip to content

Commit 6983ec3

Browse files
author
Mark Tollick
committed
Made initial changes to views, added applications page with Vulcan and Heimdall, added a tools page, which still needs content added, added example jsons, added screenshot of heimdall, updated contributors page to include inspec team and digital fusion members.
1 parent b21e5bc commit 6983ec3

28 files changed

Lines changed: 240 additions & 1268 deletions

.DS_Store

8 KB
Binary file not shown.

config.toml

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,32 +10,51 @@ metaDataFormat = "yaml"
1010
identifier = "project"
1111
url = "/project/"
1212

13+
[[menu.global]]
14+
name = "Tools"
15+
weight = 2
16+
identifier = "inspec_tools"
17+
url = "/inspec_tools"
18+
19+
[[menu.global]]
20+
name = "Applications"
21+
weight = 3
22+
identifier = "application"
23+
url = "/application/"
24+
25+
[[menu.sub]]
26+
name = "Vulcan"
27+
parent = "application"
28+
weight = 3
29+
identifier = "vulcan"
30+
url = "/application/vulcan/"
31+
1332
[[menu.global]]
1433
name = "Baselines"
15-
weight = 1
34+
weight = 4
1635
identifier = "baselines"
1736
url = "/baselines/"
1837

1938
[[menu.global]]
2039
name = "Videos"
21-
weight = 2
40+
weight = 5
2241
identifier = "videos"
2342
url = "/videos/"
2443

2544
[[menu.global]]
2645
name = "Community"
27-
weight = 3
46+
weight = 6
2847
identifier = "comunity"
2948
url = "/community/"
3049

3150
[[menu.global]]
3251
name = "News"
33-
weight = 4
52+
weight = 7
3453
identifier = "blog"
3554
url = "/blog/"
3655

3756
[[menu.global]]
3857
name = "GitHub"
39-
weight = 5
58+
weight = 8
4059
identifier = "github"
41-
url = "https://github.com/dev-sec"
60+
url = "https://github.com/mitre/mitre-inspec.github.io"

content/application.md

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
title: "Applications"
3+
layout: applications
4+
---
5+
6+
# [Vulcan](https://)
7+
8+
### Description
9+
10+
Vulcan is a tool to help streamline the process of creating STIGs and InSpec security compliance profiles. It models the STIG intent form and
11+
the process of aligning security controls from SRG items into actual STIG security controls. Vulcan also gives the option while aligning the security controls to
12+
insert inspec code and test across any type of system supported by InSpec.
13+
14+
### Features
15+
16+
* Model the STIG creation process between the creator(vendor) and the approver(sponsor)
17+
* Write and test InSpec code on a local system, or across SSH, AWS, and Docker
18+
* Easily view the progress on what the status is of each control
19+
* Communicate through the application to make the best decisions on controls
20+
* Confidential data in the database is encrypted using symmetric encryption
21+
* Authenticate via the local server, through github, and through configuring an LDAP server.
22+
23+
### Screenshots
24+
25+
Dashboard
26+
27+
28+
# [Heimdall](https://github.com/mitre/heimdall)
29+
30+
Heimdall is a centralized aggregation tool for InSpec evaluations
31+
32+
### Description
33+
Heimdall supports viewing of InSpec profiles and evaluations in a convenient
34+
interface. Data uploads can be automated through usage of curl, and added as
35+
a step after an InSpec pipeline stage.
36+
37+
### Heimdall vs Heimdall-Lite
38+
39+
There two versions of the MITRE Heimdall Viewer - the full [Heimdall](https://github.com/mitre/heimdall/) and the [Heimdall-Lite](https://github.com/mitre/heimdall-lite/) version. We produced each to meet different needs and use-cases.
40+
41+
### Features
42+
43+
| | [Heimdall-Lite](https://github.com/mitre/heimdall-lite/) | [Heimdall](https://github.com/mitre/heimdall/) |
44+
|:--------------------------------------------------------------------------|:--------------|:-------------------------------------|
45+
| Installation Requirements | any web server | rails 5.x Server <br /> MongoDB instance |
46+
| Overview Dashboard & Counts | x | x |
47+
| 800-53 Partition and TreeMap View | x | x |
48+
| Data Table / Control Summary | x | x |
49+
| InSpec Code / Control Viewer | x | x |
50+
| SSP Content Generator | x | x |
51+
| PDF Report and Print View | x | x |
52+
| | | |
53+
| Users & Roles & multi-team support | | x |
54+
| Authentication & Authorization | Hosting Webserver | Hosting Webserver<br />LDAP<br />GitHub OAUTH & SAML<br />GitLab OAUTH & SAML |
55+
| Advanced Data / Filters for Reports and Viewing | | x |
56+
| Multiple Report Output<br />(DISA Checklist XML, CAT, XCCDF-Results, and more) | | x |
57+
| Authenticated REST API | | x |
58+
| InSpec Run 'Delta' View | | x |
59+
| Multi-Report Tagging, Filtering and Compairison | | x |
60+
61+
### Use Cases
62+
63+
| [Heimdall-Lite](https://github.com/mitre/heimdall-lite/) | [Heimdall](https://github.com/mitre/heimdall/) |
64+
|:------------------------------------|:--------------------------------------------------------|
65+
| Ship the App & Data via simple Email | Multiple Teams Support |
66+
| Minimal Footprint & Deployment Time | Timeline and Report History |
67+
| Local or disconnected Use | Centralized Deployment Model |
68+
| One-Time Quick Reviews | Need to view the delta between one or more runs |
69+
| Decentralized Deployment | Need to view subsets of the 800-53 control alignment |
70+
| Minimal A&A Time | Need to produce more complex reports in multiple formats |
71+
72+
### Screenshots
73+
74+
Dashboard
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
layout: profile
3+
title: "MITRE Inspec Operating Systems"
4+
baseline: operating_systems
5+
inspec: data/cis-docker-benchmark.json
6+
---

content/inspec_tools.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
# Tools overview
2+
3+
## [Inspec Tools](https://github.com/mitre/inspec_tools)

content/project.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "DevSec Project"
2+
title: "MITRE Inspec Project"
33
layout: project
44
---
55

data/archer-baseline.json

Lines changed: 1 addition & 0 deletions
Large diffs are not rendered by default.

data/aws-s3-baseline.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"platform":{"name":"aws","release":"aws-sdk-v2.11.162"},"profiles":[{"name":"aws-s3-baseline","version":"1.0.0","sha256":"0f445e0d5880b7c8b52c641a9719d5f1f172c29bf9d56c352f9de56ba4be566d","title":"AWS S3 Public Buckets and Objects Benchmark","maintainer":"MITRE InSpec Team","summary":"An example baseline to test if you have any public s3 buckets or objects","license":"Apache-2.0","copyright":"MITRE, 2018","copyright_email":"inspec@mitre.org","supports":[{"platform":"aws"}],"attributes":[],"groups":[{"id":"controls/aws_s3_bucket.rb","controls":["s3-buckets-no-public-access"]},{"id":"controls/aws_s3_bucket_objects.rb","controls":["s3-objects-no-public-access"]}],"controls":[{"id":"s3-buckets-no-public-access","title":"Ensure there are no publicly accessible S3 buckets","desc":"Ensure there are no publicly accessible S3 buckets","descriptions":[{"label":"default","data":"Ensure there are no publicly accessible S3 buckets"}],"impact":0.7,"refs":[],"tags":{"nist":["AC-6","Rev_4"],"severity":"high","check":"Review your AWS console and note if any S3 buckets are set to\n 'Public'. If any buckets are listed as 'Public', then this is\n a finding.","fix":"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. Select the permisssions tab for\n the bucket and remove the Public access permission."},"code":"control \"s3-buckets-no-public-access\" do\n impact 0.7\n title \"Ensure there are no publicly accessible S3 buckets\"\n desc \"Ensure there are no publicly accessible S3 buckets\"\n\n tag \"nist\": [\"AC-6\", \"Rev_4\"]\n tag \"severity\": \"high\"\n\n tag \"check\": \"Review your AWS console and note if any S3 buckets are set to\n 'Public'. If any buckets are listed as 'Public', then this is\n a finding.\"\n\n tag \"fix\": \"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. Select the permisssions tab for\n the bucket and remove the Public access permission.\"\n\n aws_s3_buckets.bucket_names.each do |bucket|\n describe aws_s3_bucket(bucket) do\n it { should_not be_public }\n end\n end\n\n if aws_s3_buckets.bucket_names.empty?\n impact 0.0\n desc \"This control is Non Applicable since no S3 buckets were found.\"\n end\nend","source_location":{"line":1,"ref":"./controls/aws_s3_bucket.rb"},"results":[{"status":"passed","code_desc":"S3 Bucket s3-demo-bucket-with-public-objects should not be public","run_time":0.130646,"start_time":"2018-11-18T21:02:51-05:00"},{"status":"passed","code_desc":"S3 Bucket s3-demo-private-bucket should not be public","run_time":0.123863,"start_time":"2018-11-18T21:02:51-05:00"},{"status":"failed","code_desc":"S3 Bucket s3-demo-public-bucket should not be public","run_time":0.091162,"start_time":"2018-11-18T21:02:51-05:00","message":"expected `S3 Bucket s3-demo-public-bucket.public?` to return false, got true"}]},{"id":"s3-objects-no-public-access","title":"Ensure there are no publicly accessible S3 objects","desc":"Ensure there are no publicly accessible S3 objects","descriptions":[{"label":"default","data":"Ensure there are no publicly accessible S3 objects"}],"impact":0.7,"refs":[],"tags":{"nist":["AC-6","Rev_4"],"severity":"high","check":"Review your AWS console and note if any S3 bucket objects are set to\n 'Public'. If any objects are listed as 'Public', then this is\n a finding.","fix":"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. For each object in the bucket\n select the permissions tab for the object and remove\n the Public Access permission."},"code":"control \"s3-objects-no-public-access\" do\n impact 0.7\n title \"Ensure there are no publicly accessible S3 objects\"\n desc \"Ensure there are no publicly accessible S3 objects\"\n tag \"nist\": [\"AC-6\", \"Rev_4\"]\n tag \"severity\": \"high\"\n\n tag \"check\": \"Review your AWS console and note if any S3 bucket objects are set to\n 'Public'. If any objects are listed as 'Public', then this is\n a finding.\"\n\n tag \"fix\": \"Log into your AWS console and select the S3 buckets section. Select\n the buckets found in your review. For each object in the bucket\n select the permissions tab for the object and remove\n the Public Access permission.\"\n\n\n if aws_s3_buckets.bucket_names.empty?\n impact 0.0\n desc \"This control is Non Applicable since no S3 buckets were found.\"\n else\n aws_s3_buckets.bucket_names.each do |bucket|\n describe \"Public objects in Bucket: #{bucket}\" do\n subject { aws_s3_bucket_objects(bucket).where{ public }.keys }\n it { should cmp [] } \n end\n end\n end\nend\n","source_location":{"line":2,"ref":"./controls/aws_s3_bucket_objects.rb"},"results":[{"status":"failed","code_desc":"Public objects in Bucket: s3-demo-bucket-with-public-objects should cmp == []","run_time":0.3765,"start_time":"2018-11-18T21:02:51-05:00","message":"\nexpected: []\n got: [\"folder/public-pic.jpg\", \"public-pic.jpg\"]\n\n(compared using `cmp` matcher)\n"},{"status":"passed","code_desc":"Public objects in Bucket: s3-demo-private-bucket should cmp == []","run_time":0.021941,"start_time":"2018-11-18T21:02:52-05:00"},{"status":"passed","code_desc":"Public objects in Bucket: s3-demo-public-bucket should cmp == []","run_time":0.025541,"start_time":"2018-11-18T21:02:52-05:00"}]}],"status":"loaded"}],"statistics":{"duration":0.774471},"version":"3.0.46"}

data/cis-aws-foundations-baseline.json

Lines changed: 1 addition & 0 deletions
Large diffs are not rendered by default.

data/cms-ars3.1-cis-aws-foundations-baseline.json

Lines changed: 1 addition & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)