Skip to content

Commit 615bc3d

Browse files
committed
Moving cards definition to companion file
Changing "the attacker" to names
1 parent 6031cd2 commit 615bc3d

File tree

3 files changed

+62
-126
lines changed

3 files changed

+62
-126
lines changed

source/cloud-cards-1.0-en.yaml

Lines changed: 0 additions & 114 deletions
This file was deleted.

source/companion-cards-1.0.yaml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -153,62 +153,62 @@ suits:
153153
id: CLD2
154154
value: 2
155155
url: https://cornucopia.owasp.org/cards/CLD2
156-
desc:
156+
desc: "Dan can abuse overly permissive roles assigned to an application to gain full access to cloud services beyond its intended scope"
157157
-
158158
id: CLD3
159159
value: 3
160160
url: https://cornucopia.owasp.org/cards/CLD3
161-
desc:
161+
desc: "Roupe can discover a publicly accessible cloud storage bucket and downloaded sensitive customer data directly from the internet"
162162
-
163163
id: CLD4
164164
value: 4
165165
url: https://cornucopia.owasp.org/cards/CLD4
166-
desc:
166+
desc: "Ryan can operate within critical cloud services without triggering alerts by exploiting the absence of audit logs and security monitoring"
167167
-
168168
id: CLD5
169169
value: 5
170170
url: https://cornucopia.owasp.org/cards/CLD5
171-
desc:
171+
desc: "Josh can inject malicious code into the cloud Continous Integration/Continous Delivery pipeline by abusing unprotected build variables"
172172
-
173173
id: CLD6
174174
value: 6
175175
url: https://cornucopia.owasp.org/cards/CLD6
176-
desc:
176+
desc: "Monica can exploit a poorly protected cloud API to enumerate resources and manipulate backend cloud services"
177177
-
178178
id: CLD7
179179
value: 7
180180
url: https://cornucopia.owasp.org/cards/CLD7
181-
desc:
181+
desc: "Jon can escape from a compromised container and gained access to the underlying cloud host"
182182
-
183183
id: CLD8
184184
value: 8
185185
url: https://cornucopia.owasp.org/cards/CLD8
186-
desc:
186+
desc: "Siddharth can exploit a shared cloud account without access isolation, using metadata and tags to identify and access resources belonging to multiple products"
187187
-
188188
id: CLD9
189189
value: 9
190190
url: https://cornucopia.owasp.org/cards/CLD9
191-
desc:
191+
desc: "Akash can pivot from one compromised cloud account into multiple connected environments using existing trust relationships"
192192
-
193193
id: CLDX
194194
value: X
195195
url: https://cornucopia.owasp.org/cards/CLDX
196-
desc:
196+
desc: "Adrian can introduce backdoored Infrastructure-as-Code templates into version control, causing vulnerable cloud environments to be deployed at scale"
197197
-
198198
id: CLDJ
199199
value: J
200200
url: https://cornucopia.owasp.org/cards/CLDJ
201-
desc:
201+
desc: "Michael can compromise a CI runner and injected malicious code into container images that were automatically promoted to production across all cloud clusters"
202202
-
203203
id: CLDQ
204204
value: Q
205205
url: https://cornucopia.owasp.org/cards/CLDQ
206-
desc:
206+
desc: "Eleftherios can leverage a breach in one cloud service to pivot into another by abusing shared identities, pipelines, and secrets"
207207
-
208208
id: CLDK
209209
value: K
210210
url: https://cornucopia.owasp.org/cards/CLDK
211-
desc:
211+
desc: "Daniele can compromise the cloud root or break-glass account, gaining irreversible control over billing, identities, and recovery mechanisms"
212212
-
213213
id: CLDA
214214
value: A

source/companion-mappings-1.0.yaml

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,50 +120,100 @@ suits:
120120
id: CLD2
121121
value: 2
122122
url: https://cornucopia.owasp.org/cards/CLD2
123+
stride: [ E ]
124+
ccm: [ IAM-05, IAM-09 ]
125+
mitre_attack: [ T1098.003, T1078.004 ]
126+
cwe: [ CWE-732 ]
127+
capec: [ CAPEC-122 ]
123128
-
124129
id: CLD3
125130
value: 3
126131
url: https://cornucopia.owasp.org/cards/CLD3
132+
stride: [ I ]
133+
ccm: [ DSP-17, IVS-03, LOG-04 ]
134+
mitre_attack: [ T1530 ]
135+
cwe: [ CWE-200 ]
136+
capec: [ CAPEC-545 ]
127137
-
128138
id: CLD4
129139
value: 4
130140
url: https://cornucopia.owasp.org/cards/CLD4
141+
stride: [ R ]
142+
ccm: [ LOG-01, LOG-05, LOG-07 ]
143+
mitre_attack: [ T1562.008 ]
144+
capec: [ CAPEC-268 ]
131145
-
132146
id: CLD5
133147
value: 5
134148
url: https://cornucopia.owasp.org/cards/CLD5
149+
stride: [ T ]
150+
ccm: [ AIS-05, CCC-02, CCC-04 ]
151+
mitre_attack: [ T1195.002 ]
152+
capec: [ CAPEC-242 ]
135153
-
136154
id: CLD6
137155
value: 6
138156
url: https://cornucopia.owasp.org/cards/CLD6
157+
stride: [ T, I ]
158+
ccm: [ AIS-01, AIS-02, AIS-04, LOG-03 ]
159+
mitre_attack: [ T1528, T1530 ]
160+
capec: [ CAPEC-54 ]
139161
-
140162
id: CLD7
141163
value: 7
142164
url: https://cornucopia.owasp.org/cards/CLD7
165+
stride: [ E ]
166+
ccm: [ IVS-04, IVS-06 ]
167+
mitre_attack: [ T1611, TA0008 ]
168+
capec: [ CAPEC-480 ]
143169
-
144170
id: CLD8
145171
value: 8
146172
url: https://cornucopia.owasp.org/cards/CLD8
173+
stride: [ E ]
174+
ccm: [ DSP-04, DSP-17 ]
175+
mitre_attack: [ T1552.005 ]
176+
capec: [ CAPEC-545 ]
147177
-
148178
id: CLD9
149179
value: 9
150180
url: https://cornucopia.owasp.org/cards/CLD9
181+
stride: [ E ]
182+
ccm: [ IAM-04, IVS-06 ]
183+
mitre_attack: [ T1021.007, TA0008 ]
184+
capec: [ CAPEC-161 ]
151185
-
152186
id: CLDX
153187
value: X
154188
url: https://cornucopia.owasp.org/cards/CLDX
189+
stride: [ T ]
190+
ccm: [ AIS-04, AIS-06, CCC-06 ]
191+
mitre_attack: [ T1195.001, T1584.004 ]
192+
capec: [ CAPEC-248 ]
155193
-
156194
id: CLDJ
157195
value: J
158196
url: https://cornucopia.owasp.org/cards/CLDJ
197+
stride: [ T ]
198+
ccm: [ IVS-01, IVS-05, CCC-04 ]
199+
mitre_attack: [ T1554, T1195 ]
200+
capec: [ CAPEC-439 ]
159201
-
160202
id: CLDQ
161203
value: Q
162204
url: https://cornucopia.owasp.org/cards/CLDQ
205+
stride: [ I, E ]
206+
ccm: [ IAM-05, IAM-116 ]
207+
mitre_attack: [ T1195 ]
208+
capec: [ CAPEC-161 ]
163209
-
164210
id: CLDK
165211
value: K
166212
url: https://cornucopia.owasp.org/cards/CLDK
213+
stride: [ S ]
214+
ccm: [ IAM-01, IAM-02, IAM-09 ]
215+
mitre_attack: [ T1098 ]
216+
capec: [ CAPEC-233 ]
167217
-
168218
id: SDL
169219
name: SSDLC

0 commit comments

Comments
 (0)