Skip to content

Commit 9abde28

Browse files
authored
style fixes (#945)
prodded by @mbuechse in the heat of the hackathon Signed-off-by: Felix Kronlage-Dammers <[email protected]>
1 parent c5ee768 commit 9abde28

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

Standards/scs-0124-w1-security-of-iaas-service-software.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,29 @@ supplements:
99

1010
## Testing or Detecting security updates in software
1111

12-
It is not always possible to automatically test, whether the software has the newest security updates.
13-
This is because software versions may differ or some CSPs might have added downstream code parts or using other software than the reference.
14-
Also vulnerabilites and their fixes are quite different in testing, some might not be testable while others are.
15-
Additionally testing might be perceived as an attack on the infrastructure.
12+
It is not always possible to automatically test whether the software has the newest security updates.
13+
This is because software versions may differ, or some CSPs might have added downstream code parts or be using other software than the reference.
14+
Also vulnerabilities and their fixes are quite different in testing; some might not be testable while others are.
15+
Additionally, testing might be perceived as an attack on the infrastructure.
1616
So this standard will rely on the work and information CSPs must provide.
17-
There are different cases and procedures which are addressed in the following parts, that lead to compliance for this standard.
17+
There are different cases and procedures, which are addressed in the following parts, that lead to compliance for this standard.
1818

19-
### Procedure to become compliant to the security of IaaS service software Standard
19+
### Procedure to become compliant with the security of IaaS service software standard
2020

2121
This is the procedure when a new deployment wants to achieve SCS-conformancy.
2222
There are two states such a deployment can be in:
2323

24-
1. When a deployment is newly build or installed it usually uses software which includes all the latest security and bug fixes.
25-
Such deployments should be considered compliant to the standard.
24+
1. When a deployment is newly built or installed, it usually uses software that includes all the latest security and bug fixes.
25+
Such deployments should be considered compliant with the standard.
2626

27-
2. When a CSP wants to make an older deployment compliant to the SCS standards and thus also to this standard, it should be checked, whether the running software is up to date and all vulnerabilites are fixed.
27+
2. When a CSP aims to make an older deployment compliant with the SCS standards, it should be checked whether the running software is up-to-date and no known vulnerabilities are present.
2828
Any updates or upgrades to even newer versions should be done before the SCS compliance for every other standard is checked.
2929
Afterwards the CSP may provide information about the used software in an SBOM or otherwise should provide a notice about the deployment having integrated all necessary vulnerability patches.
3030

31-
### Procedure when new vulnerabilites are discovered
31+
### Procedure when new vulnerabilities are discovered
3232

3333
Whenever there are new vulnerabilities discovered in IaaS service software like OpenStack there is either an internal discussion ongoing or it is just a smaller issue.
34-
In the first case CSPs should have someone following such discussions and may even help preparing and testing patches.
34+
In the first case, CSPs should have someone following such discussions and may even help prepare and test patches.
3535
From the moment on the vulnerability is disclosed publicly, the risk of it being actively exploited increases greatly.
3636
So CSPs MUST watch out for announcements like in the OSSAs and OSSNs and when they are affected, update their deployment within the following timeframes according to the severity of the issue:
3737

@@ -40,6 +40,6 @@ So CSPs MUST watch out for announcements like in the OSSAs and OSSNs and when th
4040
3. Mid (CVSS = 4.0 – 6.9): 1 month
4141
4. Low (CVSS = 0.1 – 3.9): 3 months
4242

43-
Afterwards CSPs MUST provide a notice to the OSBA, that they are not or not anymore affected by the vulnerabilty.
43+
Afterwards CSPs MUST provide a notice to the OSBA, that they are not or not any more affected by the vulnerability.
4444
This can be done through either telling, what patches were integrated or showing configuration that renders the attack impossible.
4545
It could also be provided a list of services, when the affected service is not used in that deployment.

0 commit comments

Comments
 (0)