Skip to content

Latest commit

 

History

History
101 lines (54 loc) · 4.01 KB

sc07-tc02-detect-SQL-injection.md

File metadata and controls

101 lines (54 loc) · 4.01 KB

SC07-TC02: Application Security with Tanzu Service Mesh (TSM) - Threat Detection Using TSM

This scenario captures how to detect hacking attempts to an application running on TSM.


Test Case Summary

This scenario walks through how to create a Threat Detection Policy to capture hacking attempts to the ACME Fitness Application via the TSM UI.


Useful documentation


Prerequisites


Test Procedure

This test procedure assumes that the full ACME Fitness Application was deployed to the Kubernetes Cluster ${KUBERNETES_CLUSTER1}.

  1. On the TSM UI from the left menu select Policy > Threat Detection and click NEW POLICY to create a new Threat Detection Policy.

    Expected:

    TSM Threat Detection

  2. On the New Attack Detection Policy dialog enter a policy name and select the previously created Global Namespace (GNS). Make sure the SQL INJECTION request attack is selected and click NEXT.

    Expected:

    TSM Threat Detection - New Policy

    TSM Threat Detection - New Policy SQL Injection

  3. Use the default selection Level 1 (Low) for the advanced settings and select NEXT.

    Expected:

    TSM Threat Detection - New Policy Advanced Settings

  4. For policy targets keep the default All Services in the GNS and select NEXT.

    Expected:

    TSM Threat Detection - New Policy Targets

  5. Validate the data entered for the Threat Detection Policy and click SAVE to create it.

    Expected:

    TSM Threat Detection - New Policy Create

  6. Confirm the Threat Detection Policy was created.

    Expected:

    TSM Threat Detection - New Policy Created

  7. From a browser go to your deployed ACME Fitness Application and paste the following SQL Injection script that will attack the catalog service product page.

    http://${ACME_FITNESS_FQDN}/products?id=productId%22%20UNION%[%E2%80%A6]20database(),2,3,4,5,6,7%20--+

    Expected:

    ACME Fitness Application - SQL Injection

  8. Back in the TSM UI navigate back to the GNS Topology Inventory > Global Namespace and toggle the Attacks button to display the SQL Inejection attack.

    Expected:

    TSM GNS Topology - Attacks

  9. Validate that the SQL Injection attack was also captured under the Security > Security Events dashboards and that details of the event are accessible.

    Expected:

    TSM Security Events - SQL Injection

    TSM Security Events Detail - SQL Injection


Status Pass/Fail

  • [ ] Pass
  • [ ] Fail

Return to Test Cases Inventory