Skip to main content

Security Debt Register

Purpose

This register tracks known security gaps, limitations, and postponed improvements within Scheol Security Lab.

The objective is to:

  • maintain visibility on unresolved issues
  • support prioritisation of security efforts
  • ensure transparency on current limitations
  • provide traceability between risks, controls and improvement actions

Definition

Security debt represents:

Any known weakness, limitation or incomplete implementation that impacts the security posture but has not yet been fully addressed

This includes:

  • architectural limitations
  • incomplete control implementation
  • missing detection capabilities
  • operational constraints
  • temporary design decisions

Debt Register

IDTitleDescriptionRelated RiskPriorityStatusTarget
SD-001Service Co-location (Heaven VPS-01)Public services and Gitea share the same host, increasing lateral movement riskR-001HighIn ProgressSeparation of services (ADR-001)
SD-002No Centralized LoggingLogs are not fully centralized, limiting detection and investigation capabilitiesR-002CriticalIn ProgressSOC deployment (ADR-002)
SD-003Uncontrolled Admin AccessAdministrative access not fully restricted through bastion, partial use of personal workstationR-003CriticalIn ProgressBastion enforcement (ADR-003)
SD-004Weak Backup IsolationBackups rely on provider snapshots stored on same infrastructureR-001HighPlannedExternal immutable backups
SD-005Lack of WAF Protection (Dolibarr)Public application exposed without dedicated WAF or advanced filteringR-001HighPlannedWAF deployment / reverse proxy hardening
SD-006Limited MFA CoverageMFA not consistently enforced across all sensitive servicesR-003HighIn ProgressMFA generalization
SD-007Incomplete Detection CoverageDetection rules and monitoring coverage still limitedR-002MediumPlannedDetection engineering improvements
SD-008Admin Workstation Not IsolatedAdministration performed from non-dedicated environmentR-003HighPlannedDedicated admin workstation

Status Definitions

  • Open → identified but not yet addressed
  • In Progress → actively being worked on
  • Planned → acknowledged but not started
  • Accepted Risk → intentionally not addressed (with justification)
  • Resolved → implemented and validated

Prioritisation Logic

Priorities are determined based on:

  • associated risk level
  • exposure (internet-facing vs internal)
  • potential impact
  • dependency on other components

Traceability

Each entry should be linked to:

  • a risk entry (R-XXX)
  • optionally a decision record (ADR-XXX)
  • related controls or validation gaps

This ensures alignment with the global logic:

Risk → Control → Implementation → Validation → Improvement


Governance

  • Security Role (Sec)
    Maintains and prioritises the register

  • Operations Role (Ops)
    Implements infrastructure-related improvements

  • Development Role (Dev)
    Handles application and automation-related improvements


Current Maturity

At the current stage, the security debt register is considered actively used and meaningful.

Established

  • identification of major security gaps
  • linkage between risks and improvement actions
  • initial prioritisation logic

In Progress

  • refinement of prioritisation criteria
  • better linkage with validation and monitoring outputs
  • continuous update based on lab evolution

Planned / Next Phase

  • integration with audit and evidence workflows
  • tracking of remediation effectiveness
  • historical tracking of resolved debt

This register reflects a deliberate approach to transparent and risk-aware security improvement.