Skip to content

Commit f4d10d4

Browse files
author
steve.springett
committed
Adding threat models
Signed-off-by: steve.springett <[email protected]>
1 parent 83ce9d0 commit f4d10d4

File tree

2 files changed

+1329
-0
lines changed

2 files changed

+1329
-0
lines changed
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
{
2+
"specFormat": "CycloneDX",
3+
"specVersion": "2.0",
4+
"blueprints": [
5+
{
6+
"bom-ref": "blueprint-1",
7+
"blueprintMetadata":{
8+
"timestamp": "2025-09-12T15:42:30Z",
9+
"authors": [],
10+
"reviewers": [],
11+
"reviewDate": "2025-09-03",
12+
"approvers": [],
13+
"approvalDate": "2025-09-12",
14+
"ordinalVersion": "1.0",
15+
"lifecycles": [
16+
{
17+
"phase": "operations"
18+
}
19+
],
20+
"validityPeriod": {
21+
"start": "",
22+
"end": "",
23+
"reviewFrequency": "P3M"
24+
}
25+
},
26+
"modelTypes": [
27+
"threat",
28+
"dataFlow",
29+
"logical"
30+
],
31+
"methodologies": [
32+
"STRIDE",
33+
"LINDDUN"
34+
],
35+
"perspectives": [
36+
{
37+
"bom-ref": "perspective-1",
38+
"type": "security",
39+
"name": "",
40+
"role": "Security Architect",
41+
"objectives": [],
42+
"concerns": [],
43+
"viewpoint": ""
44+
],
45+
"scope": {
46+
"bom-ref": "scope-1",
47+
"name": "HashiCorp Vault",
48+
"description": "HashiCorp Vault is a secrets management system that provides secure storage, access control, dynamic credentials, cryptographic operations (Transit), and secret leasing/renewal. A typical deployment consists of Vault clients (applications, CI/CD, operators) communicating over TLS with one or more Vault server nodes. Vault enforces authentication (e.g., AppRole, AWS/GCP/IAM, OIDC/JWT, Kubernetes), issues scoped tokens bound to policies, and gates all operations through its HTTP API. The server maintains an encrypted storage barrier and persists data in a backend - the integrated Storage/Raft deployment is the one in scope. Clusters are commonly configured in HA mode with an active leader and standby nodes. Core security properties include encryption at rest within the barrier, mutual TLS on all control/data paths, least-privilege policies, response wrapping, and short-lived dynamic secrets. Operational workflows cover initialization and sealing (Shamir key shares), unsealing, rotation of root keys and encryption keys, audit device configuration (e.g., file/socket/syslog), mount-by-mount secrets engine hardening, and strict network segmentation—especially between clients, Vault nodes, and the storage backend. Misconfigurations to consider include over-permissive policies, exposed Raft/Consul ports, weak auth method constraints, disabled audit logging, and long-lived tokens. This threat model involves an AWS deployment with k8s and a load balancer",
49+
"$comment": "Business criticality, data sensitivity, and tier are defined on the individual assets. Exposure is not defined yet.",
50+
"boundaries": [],
51+
"includedComponents": [],
52+
"excludedComponents": []
53+
54+
},
55+
"visualizations": [
56+
57+
],
58+
"externalReferences": [
59+
{
60+
"type": "documentation",
61+
"url": "https://developer.hashicorp.com/vault/docs"
62+
},
63+
{
64+
"type": "vcs",
65+
"url": "https://github.com/hashicorp/vault"
66+
}
67+
]
68+
}
69+
}
70+
]
71+
}

0 commit comments

Comments
 (0)