-
Notifications
You must be signed in to change notification settings - Fork 1
Description
π Issue Type
Documentation / Security Compliance
π― Objective
Add dedicated Threat Detection & Investigation, Vulnerability Management, Automated Security Operations, and Resilience & Operational Readiness sections to SECURITY_ARCHITECTURE.md. These are standalone mandatory sections in both CIA and Black Trigram reference implementations but are either missing or only partially covered as subsections in riksdagsmonitor.
π Current State
The riksdagsmonitor SECURITY_ARCHITECTURE.md covers some topics superficially within Β§2.6 (Monitoring & Logging) and Β§4 (Security Controls Summary) but lacks the depth and structure of reference implementations:
| Mandatory Section | CIA | BT | Riksdagsmonitor |
|---|---|---|---|
π΅οΈ Threat Detection & Investigation |
β (GuardDuty, Detective, deep analysis) | β (Current status, security implications) | β Missing |
π Vulnerability Management |
β (Inspector, remediation process, key benefits) | β (Current status, security considerations) | |
π€ Automated Security Operations |
β (SSM, automation components) | β (Current status, operational benefits) | β Missing |
β‘ Resilience & Operational Readiness |
β (Resilience Hub, testing strategy, BC features) | β (Current status, resilience benefits) | β Missing |
π Configuration & Compliance Management |
β (AWS Config, compliance framework integration) | β (Current status, configuration approach) | β Missing |
π Monitoring & Analytics |
β (Security Lake, analytics capabilities) | β (Current status, monitoring limitations) |
π Desired State
Add 6 dedicated sections with riksdagsmonitor-specific content:
1. ## π΅οΈ Threat Detection & Investigation
- GitHub security alert monitoring (Dependabot, CodeQL, Secret scanning)
- AWS CloudTrail anomaly detection
- CloudFront access log analysis for suspicious patterns
- Detection capabilities matrix (what can vs. cannot be detected)
- Investigation procedures for static site threats
2. ## π Vulnerability Management
- Dependabot automated scanning (GitHub Actions, npm dependencies)
- Chart.js/D3.js/Papa Parse version monitoring
- Vulnerability remediation SLAs (Critical: 24h, High: 7d, Medium: 30d, Low: 90d)
- Vulnerability tracking and reporting
- Key benefits of current approach
3. ## π€ Automated Security Operations
- GitHub Actions automated security workflows
- Dependabot auto-merge for minor/patch updates
- Automated HTML validation (HTMLHint) and link checking (linkinator)
- SLSA attestation generation automation
- CIA data validation automation
4. ## β‘ Resilience & Operational Readiness
- Dual deployment resilience (AWS CloudFront + GitHub Pages DR)
- Cross-region S3 replication (<15 min RPO)
- Route 53 health checks and automatic failover
- Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
- Business continuity features
5. ## π Configuration & Compliance Management
- Infrastructure as Code (GitHub Actions workflows)
- Configuration drift detection (GitHub + AWS)
- Compliance framework integration (ISO 27001, NIST CSF, CIS Controls)
- Automated compliance checking
6. ## π Monitoring & Analytics
- GitHub Actions workflow monitoring
- AWS CloudWatch metrics collection
- CloudFront access log analytics
- Security metrics dashboard (if applicable)
- Key monitoring gaps and remediation plans
π§ Implementation Approach
- Extract relevant content from existing Β§2.6 and Β§4 into new dedicated sections
- Add riksdagsmonitor-specific details for each section
- Include Mermaid diagrams where appropriate
- Add ISO 27001/NIST CSF/CIS Controls mapping to each section
- Match the subsection pattern used in CIA/BT (### Key Components, ### Security Benefits, etc.)
- Maintain consistency with existing document style
π€ Recommended Agent
security-architect β Deep security operations expertise required
β Acceptance Criteria
- 6 dedicated sections added (Threat Detection, Vulnerability Mgmt, Automated Ops, Resilience, Config/Compliance, Monitoring)
- Each section has Control Mapping to ISO 27001/NIST CSF/CIS Controls
- Vulnerability remediation SLAs documented
- Resilience section includes RTO/RPO targets
- All content is riksdagsmonitor-specific
- At least 2 new Mermaid diagrams
- Existing content preserved (no duplication)
π References
- CIA sections: https://github.com/Hack23/cia/blob/master/SECURITY_ARCHITECTURE.md
- BT sections: https://github.com/Hack23/blacktrigram/blob/main/SECURITY_ARCHITECTURE.md
- Hack23 mandatory section checklist
π·οΈ Labels
type:documentation, priority:high, component:security, agent:security-architect