import type { SystemInfoConfig } from './types' export const securityConfig: SystemInfoConfig = { title: 'Security System-Info', description: 'DevSecOps Dashboard mit Vulnerability Scanning und Compliance Checks.', version: '2.0', privacyNotes: [ 'Automatische CVE-Pruefung aller Dependencies', 'OWASP Top 10 Compliance', 'Container Security Scanning', 'Secret Detection in Code', ], architecture: { layers: [ { title: 'Security Dashboard', components: ['Vulnerability Overview', 'Compliance Status', 'Alerts'], color: '#ef4444' }, { title: 'Scanners', components: ['Trivy', 'Semgrep', 'Gitleaks', 'OWASP ZAP'], color: '#8b5cf6' }, { title: 'CI/CD Integration', components: ['GitHub Actions', 'Pre-commit Hooks', 'PR Checks'], color: '#10b981' }, { title: 'Reporting', components: ['SARIF', 'SBOM', 'Audit Reports'], color: '#f59e0b' }, ], }, features: [ { name: 'Vulnerability Scanning', status: 'active', description: 'Automatische CVE-Pruefung' }, { name: 'SBOM Generation', status: 'active', description: 'Software Bill of Materials' }, { name: 'Secret Detection', status: 'active', description: 'Gitleaks Integration' }, { name: 'DAST Scanning', status: 'planned', description: 'Dynamic Application Security Testing' }, { name: 'Penetration Testing', status: 'planned', description: 'Automatisierte Pen-Tests' }, ], roadmap: [ { phase: 'Phase 1: SAST (Q1)', priority: 'high', items: ['Semgrep Rules', 'CodeQL Integration', 'Custom Rules', 'False Positive Management'] }, { phase: 'Phase 2: Runtime (Q2)', priority: 'high', items: ['Runtime Protection', 'WAF Integration', 'Anomaly Detection', 'Incident Response'] }, { phase: 'Phase 3: Compliance (Q3)', priority: 'medium', items: ['SOC 2 Readiness', 'ISO 27001 Mapping', 'GDPR Technical Measures', 'Audit Automation'] }, ], technicalDetails: [ { component: 'Container Scan', technology: 'Trivy', version: '0.50+', description: 'Image Vulnerabilities' }, { component: 'SAST', technology: 'Semgrep', version: '1.x', description: 'Code Analysis' }, { component: 'Secrets', technology: 'Gitleaks', version: '8.x', description: 'Secret Detection' }, { component: 'SBOM', technology: 'CycloneDX', version: '1.5', description: 'Dependency List' }, ], auditInfo: [ { category: 'Vulnerability Status', items: [ { label: 'Kritische CVEs', value: '0', status: 'ok' }, { label: 'Hohe CVEs', value: '0', status: 'ok' }, { label: 'Mittlere CVEs', value: 'Tracking', status: 'warning' }, { label: 'Letzte Pruefung', value: 'Taeglich', status: 'ok' }, ], }, { category: 'Compliance', items: [ { label: 'OWASP Top 10', value: 'Geprueft', status: 'ok' }, { label: 'Secret Detection', value: 'Aktiv', status: 'ok' }, { label: 'Container Hardening', value: 'Umgesetzt', status: 'ok' }, { label: 'Dependency Updates', value: 'Woechentlich', status: 'ok' }, ], }, { category: 'Monitoring', items: [ { label: 'Echtzeit-Alerts', value: 'Aktiviert', status: 'ok' }, { label: 'SIEM Integration', value: 'Geplant', status: 'warning' }, { label: 'Penetration Tests', value: 'Quartalsweise', status: 'ok' }, { label: 'Bug Bounty', value: 'In Planung', status: 'warning' }, ], }, ], fullDocumentation: `

Security & DevSecOps Dashboard

1. Uebersicht

Das Security-Modul integriert Sicherheitspruefungen in den gesamten Entwicklungs- und Deployment-Prozess (DevSecOps). Es kombiniert statische Analyse, Container-Scanning und Laufzeitschutz.

2. Security-Tools

ToolKategorieFunktionIntegration
TrivyContainerImage Vulnerability ScanningCI/CD
SemgrepSASTCode Pattern MatchingPre-commit, CI
GitleaksSecretsCredential DetectionPre-commit, CI
OWASP ZAPDASTWeb App ScanningStaging

3. Scanning-Pipeline

┌─────────────────────────────────────────────────────────────────────┐
│                        Development Phase                             │
├─────────────────────────────────────────────────────────────────────┤
│  Pre-commit Hooks                                                    │
│  ├── Gitleaks (Secrets)                                             │
│  ├── Semgrep (Quick Rules)                                          │
│  └── Formatting/Linting                                             │
└─────────────────────────────────────────────────────────────────────┘
                                 │
                                 v
┌─────────────────────────────────────────────────────────────────────┐
│                           CI Pipeline                                │
├─────────────────────────────────────────────────────────────────────┤
│  ├── Full SAST Scan (Semgrep)                                       │
│  ├── Dependency Check (npm audit, go vuln)                          │
│  ├── Container Scan (Trivy)                                         │
│  ├── SBOM Generation (Syft)                                         │
│  └── License Compliance                                             │
└─────────────────────────────────────────────────────────────────────┘
                                 │
                                 v
┌─────────────────────────────────────────────────────────────────────┐
│                          Staging/Prod                                │
├─────────────────────────────────────────────────────────────────────┤
│  ├── DAST Scan (OWASP ZAP)                                          │
│  ├── Runtime Protection                                              │
│  └── Anomaly Detection                                               │
└─────────────────────────────────────────────────────────────────────┘

4. OWASP Top 10 Abdeckung

#RisikoMassnahmeStatus
A01Broken Access ControlRBAC, JWT Validation
A02Cryptographic FailuresTLS 1.3, AES-256
A03InjectionParameterized Queries, Input Validation
A04Insecure DesignThreat Modeling, Code Review
A05Security MisconfigurationHardened Defaults, IaC Scanning
A06Vulnerable ComponentsDependency Scanning, SBOM
A07Auth FailuresMFA, Session Management
A08Software IntegritySigned Commits, SBOM
A09Logging FailuresStructured Logging, Audit Trail
A10SSRFURL Validation, Network Policies

5. Vulnerability Management

CVE Discovered
      │
      v
┌───────────────────┐
│ Severity Rating   │
│ Critical/High/Med │
└─────────┬─────────┘
          │
    ┌─────┴─────┐
    │ Critical? │
    └─────┬─────┘
      Yes │ No
      │   └──> Backlog mit Frist
      v
┌───────────────────┐
│ Immediate Action  │
│ - Block Deploy    │
│ - Notify Team     │
│ - Hotfix Branch   │
└───────────────────┘

6. Secret Management

7. Container Security

MassnahmeImplementation
Base ImagesAlpine/Distroless, regelmaessig aktualisiert
Non-root UserAlle Container als non-root
Read-only FSWo moeglich aktiviert
Resource LimitsCPU/Memory Limits gesetzt
Network PoliciesKubernetes NetworkPolicy

8. Incident Response

  1. Detection: Automatische Alerts, Monitoring
  2. Triage: Schweregrad-Bewertung, Scope
  3. Containment: Isolation, Zugriffssperre
  4. Eradication: Ursachenbehandlung
  5. Recovery: Wiederherstellung, Monitoring
  6. Lessons Learned: Post-Mortem, Verbesserungen

9. Compliance-Reports

Automatisch generierte Reports:

10. Metriken

MetrikZielMessung
Mean Time to Remediate (Critical)< 24hAutomatisch
Mean Time to Remediate (High)< 7 TageAutomatisch
Scan Coverage100%CI Pipeline
False Positive Rate< 10%Review
`, }