Cybersecurity, Endpoint and Data Stores Documentation Examples

Example Endpoint and Data Store Documentation

About Endpoint and Data Stores Documentation

The purpose of this document is to provide guidance and examples on how to properly document API endpoints and data stores.

Properly documenting endpoints and data stores is expected and helps comply with the IT-08 Development Process Standard IT-08.4.1.

Documented endpoints and data stores should be properly sanitized.

In most cases a table located in your repo's will suffice.

Example Endpoint Documentation

EndpointPurposeStageAccess databaseProdRO systemProdRW systemDevRW SystemTestRW MAC addresses, IP addresses, and portsProdRO

Example Data Store Documentation

Data StoreData TypeSensitivityNotes
ICSDBMySQL DBInternalRead Only - For finding and comparing local ice cream shops
HeavyRock DBMongoDBInternalRead Only - A list of potential rocks to send through the mail
WatcherDBMySQL DBInternalRead Only - For observing the universe

Keywords:security, developer, sdlc, cybersecurity, devops, secdevops   Doc ID:111571
Owner:Security S.Group:University of Illinois Technology Services
Created:2021-06-09 11:07 CDTUpdated:2021-06-15 10:00 CDT
Sites:University of Illinois Technology Services
Feedback:  0   0