-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding German BSI-IT-Grundschutz #357
Comments
Sorry, I should have give you a bit of explanation:
Overall the important columns that need to be imported are:
|
thanks for the feedback @42mst 👍 |
@ab-smith In the BSI IT-Grundschutz framework, criticality levels (Schutzbedarfsfeststellung) are used to assess and categorize the need for information security measures based on the potential impact of a security incident on business processes. They correlate more depending on the asset (CIAA). The higher the criticality the stronger/complex and usually more expensive the controls that need to be implemented. Depending on the asset even a small sized company with 2 employees needs to implement the highest controls and vice versa. I´m not that deep into the CIS controls but I think they also depend more on the size of the company. Does this makes it a bit more clear? |
@ab-smith |
It’s ok thank you @42mst ; since we added support for multi level ( implementation groups ) I will use that for the BSI |
prioritized for next week @42mst , will send you a first video before merging :) I'm stating the obvious but I guess we should take out requirements like APP.1.1.A1.1 where it's mentioned as "Diese Anforderung ist entfallen" or req with "ENTFALLEN" mention ? there are so many lines like this Also for consistency, I suggest that we drop the mention between () that refer to previous editions or that the requirement is new; this can be covered with the mapping feature afterwards |
I've managed to free a couple of hours over this weekend @42mst , It seems as a very intense framework, we might need to improve our serialization to make it snappier here |
Also, after peer review, the file seems to have about 7359 sub-requirements. Does this sound reasonable? can it be auditable with this volume? |
The IT-Grundschutz is a bit different than most other frameworks I am aware of (and I'm not an expert so this might not be too uncommon). See this extract which I brought up as a question on Discord: The "controls" or "requirements" here are much more detailed than in other frameworks as the IT-Grundschutz also does a risk assessment for common scenarios and then suggests concrete steps to take - at the technical level - for each and every one of those scenarios. In addition there are three different levels of requirements: Basic, Standard and High.
So: Yes, there are a lot of sub-requirements but in reality it is narrowed down by a lot. My explanation is a) a bit simplified as a lot of the above can be customized if needed and b) might also be slightly wrong as I'm not an expert either. I still hope it helps a bit. |
Because I just saw your multi-level demo video on LinkedIn: This cannot be used like it is for IT-Grundschutz as the levels ("implementation groups") are per asset and not global. As in: One mail server can have the level "very high" while another one only has "basic". But again: I just watched the video and might mis understand. |
Thank you @lfrancke that is very helpful indeed, As a matter of fact, I get the approach of having a global registry for everything and then just mark what doesn't make sense as Not Applicable, we we do support, just thinking about the user experience on this one. BTW, the approach of having presets for risk analysis is shared also with ANSSI standards, the French authority or the NIST with their 800-53 containing +1100 controls, So the Implementation groups can be actually combined like this: so you can pick one or two out of the levels as you wish. and can be a good starting point I believe: |
The annoying parts that I'm concerned about are about performances and the fact that we don't have yet a feature to batch actions on a full node |
@ab-smith wow a lot happened. Thanks a lot guys. I will go through it:
|
For example if you are performing a cloud related assessment, it just might be enough to use a couple of 2 to 5 BAUSTEINE and not the whole framework. This would cut the ~8000 requirements down to ~60. |
Ok good idea, so in this case you are suggesting to switch to having BAUSTEINE as Implementation groups instead? |
@ab-smith Thats tricky. The current filtering to select the criticality is actually good. It would be better (because otherwise you´ll lose information) to have another layer for the selection:
The advantage of doing this could be also a new feature in the future. Consider the Bausteine more as a tag for a specific topic. If you would add those tags to other frameworks (on a control level) as well you would be able to gain more information (and also have an implicit kind of mapping.) For example as @lfrancke already mentioned some frameworks are more or less useful for implementation as they often don´t tell you how. If you are then able to filter (on control level) for a specific topic you would be able to use more precise controls (from other frameworks as well) for you implementation. Does that make sense? |
yes the tagging system is something that we have in mind indeed but won't be available right now it's tracked on #413 |
@ab-smith To be honest I don´t think this is going to be user friendly. It will create to much effort to select the controls you need to have in place. It would then make more sense to use your first suggestion and treat the Bausteine as Implementation groups instead. In the long run when focusing on #413, we could then switch to an optimized solution and use the tags to represent the Bausteine. |
I would also like to free up some capacity from my site for your #413 efforts as I think this will change the data model. Please reach out to me, if I can assist you! |
@eric-intuitem food for thoughts on this topic, #413 and #185 |
Very interesting discussion! We will address the performance issue, but what's more important is indeed the UX for selecting relevant controls. I think about a tailoring feature as suggested by @42mst to select with a top-down flexible approach the requirements to consider, and only create the relevant RequirementAssessment objects (with a capacity to change one"s mind), thus having excellent performance and frugality. And we could let users create selection templates to facilitate the process. |
Correction: split by Schicht to get the 10 I've mentioned above |
ok then I'm doing the split this weekend and should be released shortly after 😉 |
Thank you! I'll take a look after the next release. |
Discussed in https://github.com/intuitem/ciso-assistant-community/discussions/240
Originally posted by 42mst April 11, 2024
To expand even further I think it would be a good idea to include this as well.
The text was updated successfully, but these errors were encountered: