Ubuntu Process, Config Files and Docker Whistelisting

Lezárva Kiadva: 5 évvel ezelőtt Kiszállításkor fizetve
Lezárva Kiszállításkor fizetve

I have developed a Java Application using WildFLy 10 within a Docker Container. The Java application is accessed by remote users through any client browser via https. This application will be exposed to Internet.

I have apply CIS benchmark to OS Ubuntu and Docker.

In addition, in order to avoid unauthorized changes, I would like to apply whitelisting, I mean, I would like to digital sign or hash every process and config files and then the OS has to avoid to run any process with different hash or different digital signs.

To do this, I will give you remote access to my development environment with all set and run.

Deliverables

1.- Test environment with all process and config file hashed or digital signed.

2.- Documented process to reproduce the hashing or digital signing of all environment

3.- Some tool like SElinux, AppArmor, Secmod configured and running.

4.- Documented process to reproduce the installation of the tool

5.- Test the following cases:

5.1 change ssh config file, detect change and avoid ssh running

5.2 change java artifacts (WAR or EAR files) detect change and avoid to run the application

5.3 change wildfly, docker, binaries or config files, detect change and avoid to run the application

5.4 run any process not listen in the whistelist, detect the execution attemp and avoid to run this process

5.5 change /etc/shadow, detect the change and stop the application

6. Documented process to reproduce the configuration of the tool.

The proposal of Uses of Application Whitelisting Technologies:

Software inventory. Application whitelisting technologies can keep an inventory of the applications
and application versions installed on each host. This allows an organization to identify unauthorized
applications—unlicensed applications, prohibited applications, etc.—as well as to identify “wrong”
versions of software (both too old and too new). This software inventory capability is also useful for
forensic investigations, such as finding modified applications, unauthorized applications, malware,
unknown applications, etc. on a given host.

File integrity monitoring. Most application whitelisting technologies can perform frequent or
continuous monitoring of attempted changes to application files. Some technologies can prevent files from being changed, while other technologies cannot prevent changes but can immediately report when changes occur.

Source: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-167.pdf

According to the document referenced as the source, I have defined these requirements:

File and Folder Attributes: Digital Signature or Cryptographic Hash
Application Resources: Executables (Binaries), application-related files, such as libraries, scripts, configuration files.
Application Whitelisting Modes: Enforce Mode
Whitelist Generation and Maintenance Method: scan the files on a clean host (provided by me) to build a good known baseline


Java Linux Shell script Szoftverarchitektúra Ubuntu

Projektazonosító: #16937025

A projektről

5 ajánlat Távolról teljesíthető projekt Utoljára aktív: 5 évvel ezelőtt

5 szabadúszó tett átlagosan 203$ összegű árajánlatot erre a munkára

sonukalra

Hello !! We go through your requirement you needed PHP developer and we are appropriate for this job. Our main working domain is web development. We can help you with following technologies- Php. Web Techn Továbbiak

$150 USD 3 napon belül
(0 vélemény)
0.0
rinki9

A proposal has not yet been provided

$444 USD 7 napon belül
(0 vélemény)
0.0
jonesthomas1995

HI , I'd like to be considered for your writing position. I am having a background in working with Docker and ubuntu. I highly value professionalism and hold myself strictly accountable to represent my client's br Továbbiak

$155 USD 3 napon belül
(0 vélemény)
0.0