Penetration Testing Program¶
IEC 62443-4-1 SVV-4 Compliance
1. Purpose¶
This document defines the penetration testing program for the RUNE platform, satisfying IEC 62443-4-1 SVV-4 requirements for security verification and validation through adversarial testing.
2. Scope¶
2.1 In-Scope Components¶
| Component | Attack Surface | Priority |
|---|---|---|
REST API (rune_bench/api_server.py) |
HTTP endpoints, authentication, authorization | Critical |
| DriverTransport protocol | Inter-process communication, command injection | Critical |
| Kubernetes Operator CRDs | RBAC, admission control, privilege escalation | High |
| Web UI (HTMX) | XSS, CSRF, session management | High |
| Vast.ai provisioning | Cost injection, credential leakage | High |
| Helm chart defaults | Insecure defaults, privilege escalation | Medium |
| MkDocs documentation site | Information disclosure | Low |
2.2 Out-of-Scope¶
- Third-party SaaS infrastructure (GitHub, Vast.ai backend systems).
- Physical security of development workstations.
- Social engineering attacks.
3. Frequency¶
| Trigger | Type | Scope |
|---|---|---|
| Quarterly (Jan, Apr, Jul, Oct) | Scheduled | Full scope |
| Pre-release (before any minor/major version) | Gate | Full scope |
| API or auth schema change | Triggered | Affected component |
| New agent integration | Triggered | DriverTransport + agent boundary |
4. Methodology¶
Testing follows a combination of industry-standard frameworks:
flowchart TD
A[Planning & Scoping] --> B[Reconnaissance]
B --> C[Vulnerability Analysis]
C --> D[Exploitation]
D --> E[Post-Exploitation]
E --> F[Reporting]
F --> G[Remediation Verification]
4.1 Standards¶
- OWASP Testing Guide v4 -- Web application and API testing.
- PTES (Penetration Testing Execution Standard) -- Overall methodology.
- OWASP API Security Top 10 -- API-specific attack vectors.
4.2 Test Categories¶
- Authentication and Authorization -- Token handling, RBAC bypass, privilege escalation.
- Input Validation -- SQL injection, command injection via DriverTransport, YAML deserialization.
- API Security -- Rate limiting, mass assignment, BOLA/BFLA.
- Container Security -- Escape vectors, image tampering, unsigned image acceptance.
- Supply Chain -- Dependency confusion, CI pipeline poisoning, unsigned artifacts.
- Configuration -- Default credentials, overly permissive RBAC, exposed debug endpoints.
5. Tools¶
| Tool | Purpose |
|---|---|
| Burp Suite Professional | Web/API interactive testing |
| OWASP ZAP | Automated web scanning |
| Nuclei | Template-based vulnerability scanning |
| kube-hunter | Kubernetes-specific attack simulation |
| trivy | Container and filesystem scanning |
| grype | SBOM-based vulnerability matching |
| sqlmap | SQL injection testing |
| Custom scripts | DriverTransport protocol fuzzing |
6. Reporting Template¶
Each penetration test produces a report with the following structure:
6.1 Executive Summary¶
- Test date range
- Scope and methodology
- Overall risk rating (Critical / High / Medium / Low)
- Key findings count by severity
6.2 Findings¶
Each finding includes:
| Field | Description |
|---|---|
| ID | Unique identifier (e.g., PT-2026-Q1-001) |
| Title | Concise description |
| Severity | Critical / High / Medium / Low / Informational |
| CVSS v3.1 Score | Numeric score |
| Affected Component | Repository, file, or endpoint |
| Description | Detailed explanation |
| Proof of Concept | Steps to reproduce |
| Remediation | Recommended fix |
| References | CWE, OWASP, CVE if applicable |
6.3 Remediation Tracking¶
Findings are tracked as GitHub issues with the security label.
7. Remediation SLA¶
| Severity | Remediation Deadline | Retest Deadline |
|---|---|---|
| Critical (CVSS >= 9.0) | 48 hours | 72 hours |
| High (CVSS 7.0-8.9) | 7 calendar days | 14 calendar days |
| Medium (CVSS 4.0-6.9) | 30 calendar days | 45 calendar days |
| Low (CVSS < 4.0) | Next milestone | Next milestone + 30 days |
Findings above CVSS 8.8 with no upstream fix require fork-and-patch per the vulnerability closure policy in SYSTEM_PROMPT.md.
8. Historical Results¶
Placeholder: No penetration tests have been conducted yet. The first scheduled test is Q2 2026. Results will be recorded in this section as they become available.
| Test ID | Date | Scope | Findings (C/H/M/L) | Status |
|---|---|---|---|---|
| PT-2026-Q2-001 | TBD | Full | -- | Scheduled |
9. References¶
- IEC 62443-4-1:2018 SVV-4 -- Penetration testing
- OWASP Testing Guide v4
- PTES (Penetration Testing Execution Standard)
- SDL.md -- Security Development Lifecycle
- RISK_ASSESSMENT.md -- Threat model informing test scope
- FUZZ_TESTING.md -- Complementary fuzz testing program
- INCIDENT_RESPONSE.md -- Response process for critical findings