Skip to content

Commit 1d41e9e

Browse files
committed
Deployed 66992f2 with MkDocs version: 1.5.3
1 parent 2f1b686 commit 1d41e9e

5 files changed

Lines changed: 79 additions & 41 deletions

File tree

introduction/Introduction/index.html

Lines changed: 46 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -403,6 +403,15 @@
403403
</span>
404404
</a>
405405

406+
</li>
407+
408+
<li class="md-nav__item">
409+
<a href="#who-contributed-to-this-guide" class="md-nav__link">
410+
<span class="md-ellipsis">
411+
Who Contributed to This Guide
412+
</span>
413+
</a>
414+
406415
</li>
407416

408417
<li class="md-nav__item">
@@ -433,18 +442,18 @@
433442
</li>
434443

435444
<li class="md-nav__item">
436-
<a href="#notes" class="md-nav__link">
445+
<a href="#alternative-or-additional-guidance" class="md-nav__link">
437446
<span class="md-ellipsis">
438-
Notes
447+
Alternative or Additional Guidance
439448
</span>
440449
</a>
441450

442451
</li>
443452

444453
<li class="md-nav__item">
445-
<a href="#alternative-or-additional-guidance" class="md-nav__link">
454+
<a href="#notes" class="md-nav__link">
446455
<span class="md-ellipsis">
447-
Alternative or Additional Guidance
456+
Notes
448457
</span>
449458
</a>
450459

@@ -1371,6 +1380,15 @@
13711380
</span>
13721381
</a>
13731382

1383+
</li>
1384+
1385+
<li class="md-nav__item">
1386+
<a href="#who-contributed-to-this-guide" class="md-nav__link">
1387+
<span class="md-ellipsis">
1388+
Who Contributed to This Guide
1389+
</span>
1390+
</a>
1391+
13741392
</li>
13751393

13761394
<li class="md-nav__item">
@@ -1401,18 +1419,18 @@
14011419
</li>
14021420

14031421
<li class="md-nav__item">
1404-
<a href="#notes" class="md-nav__link">
1422+
<a href="#alternative-or-additional-guidance" class="md-nav__link">
14051423
<span class="md-ellipsis">
1406-
Notes
1424+
Alternative or Additional Guidance
14071425
</span>
14081426
</a>
14091427

14101428
</li>
14111429

14121430
<li class="md-nav__item">
1413-
<a href="#alternative-or-additional-guidance" class="md-nav__link">
1431+
<a href="#notes" class="md-nav__link">
14141432
<span class="md-ellipsis">
1415-
Alternative or Additional Guidance
1433+
Notes
14161434
</span>
14171435
</a>
14181436

@@ -1510,6 +1528,12 @@ <h2 id="how-to-use-this-guide">How to Use This Guide<a class="headerlink" href="
15101528
</ol>
15111529
<p>Each of the <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Models above use similar risk factors (known exploitation and likelihood of exploitation, with variants of <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> base metrics parameters or scores) but in very different ways to rank/score the risk/priority. The outcome is the same - a much more granular prioritization at the high end of risk than offered by <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>.</p>
15121530
<p>If you're looking for the "easy button", or the one scheme to rule them all for <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization, you won't find it (here or anywhere else).</p>
1531+
<h2 id="who-contributed-to-this-guide">Who Contributed to This Guide<a class="headerlink" href="#who-contributed-to-this-guide" title="Permanent link">&para;</a></h2>
1532+
<p>Various experts and thought leaders <a href="../contributors/">contributed to this guide</a>, including those that:</p>
1533+
<ul>
1534+
<li>developed the standards or solutions described in this guide as used in industry</li>
1535+
<li>have many years of experience in vulnerability management across various <a href="../../requirements/Requirements/#personas">roles</a></li>
1536+
</ul>
15131537
<h2 id="how-to-contribute-to-this-guide">How to Contribute to This Guide<a class="headerlink" href="#how-to-contribute-to-this-guide" title="Permanent link">&para;</a></h2>
15141538
<p>You can contribute content or suggest changes:</p>
15151539
<ul>
@@ -1537,26 +1561,25 @@ <h2 id="source-code">Source Code<a class="headerlink" href="#source-code" title=
15371561
</li>
15381562
<li>This code is licensed under the Apache 2 Open Source License.</li>
15391563
</ol>
1564+
<h2 id="alternative-or-additional-guidance">Alternative or Additional Guidance<a class="headerlink" href="#alternative-or-additional-guidance" title="Permanent link">&para;</a></h2>
1565+
<p>This guide is not an introductory or verbose treatment of topics with broader or background context. For that, consider the following (no affiliation to the authors): </p>
1566+
<ul>
1567+
<li><a href="https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207">Effective Vulnerability Management: Managing <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> in the Vulnerable Digital Ecosystem</a> </li>
1568+
<li><a href="https://www.amazon.com/Software-Transparency-Security-Software-Driven-Society/dp/1394158483/">Software Transparency: Supply Chain Security in an Era of a Software-Driven Society</a></li>
1569+
<li><a href="https://www.amazon.com/Software-Supply-Chain-Security-End/dp/1098133706">Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware</a></li>
1570+
</ul>
15401571
<h2 id="notes">Notes<a class="headerlink" href="#notes" title="Permanent link">&para;</a></h2>
1572+
<div class="admonition notes">
1573+
<p class="admonition-title">Notes</p>
15411574
<ol>
1542-
<li>
1543-
<p>This guide is not affiliated with any Tool/Company/Vendor/Standard/Forum/Data source. </p>
1544-
<ol>
1545-
<li>Mention of a vendor in this guide is not a recommendation or endorsement of that vendor. <ol>
1546-
<li>The choice of vendors was determined by different contributors who had an interest in that vendor.</li>
1547-
</ol>
1548-
</li>
1575+
<li>This guide is not affiliated with any Tool/Company/Vendor/Standard/Forum/Data source. <ol>
1576+
<li>Mention of a vendor in this guide is not a recommendation or endorsement of that vendor.
1577+
1. The choice of vendors was determined by different contributors who had an interest in that vendor.</li>
15491578
</ol>
15501579
</li>
1551-
<li>
1552-
<p>This guide is a living document i.e. it will change and grow over time - with your input.</p>
1553-
</li>
1580+
<li>This guide is a living document i.e. it will change and grow over time - with your input.</li>
15541581
</ol>
1555-
<h2 id="alternative-or-additional-guidance">Alternative or Additional Guidance<a class="headerlink" href="#alternative-or-additional-guidance" title="Permanent link">&para;</a></h2>
1556-
<p>This guide is not a verbose treatment of topics with broader or background context. For that, consider the following (no affiliation to the author): </p>
1557-
<ul>
1558-
<li><a href="https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207">Effective Vulnerability Management: Managing <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> in the Vulnerable Digital Ecosystem</a> </li>
1559-
</ul>
1582+
</div>
15601583

15611584

15621585

introduction/contributors/index.html

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1336,7 +1336,12 @@ <h2 id="chris-madden">Chris Madden<a class="headerlink" href="#chris-madden" tit
13361336
<p>A large part of that was to be able to prioritize vulnerabilities by Real <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>. </p>
13371337
<p>Lots of dumb questions and data analysis later, this guide represents the distillation of that knowledge into a user-centric system view - what I wish I knew before I started - and learnt by interacting with other users, standards groups, and tool vendors. </p>
13381338
<p>There's a friendly vibrant community in this space - many of whom have contributed to this guide.</p>
1339-
<p>Special thanks to my colleague Lisa for the expert input, keeping all this real, and tolerating more dumb questions than any human should endure in one lifetime!</p>
1339+
<p><img alt="🙏" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f64f.svg" title=":pray:" /> Special thanks to</p>
1340+
<ol>
1341+
<li>My family <img alt="" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/2764.svg" title=":heart:" /> </li>
1342+
<li>My employer Yahoo for cultivating such a rich environment for people to thrive.</li>
1343+
<li>My colleague Lisa for the expert input, keeping all this real, and tolerating more dumb questions than any human should endure in one lifetime!</li>
1344+
</ol>
13401345

13411346

13421347

print_page/index.html

Lines changed: 26 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1602,6 +1602,12 @@ <h2 id="introduction-introduction-how-to-use-this-guide">How to Use This Guide<a
16021602
</ol>
16031603
<p>Each of the <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Models above use similar risk factors (known exploitation and likelihood of exploitation, with variants of <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> base metrics parameters or scores) but in very different ways to rank/score the risk/priority. The outcome is the same - a much more granular prioritization at the high end of risk than offered by <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>.</p>
16041604
<p>If you're looking for the "easy button", or the one scheme to rule them all for <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization, you won't find it (here or anywhere else).</p>
1605+
<h2 id="introduction-introduction-who-contributed-to-this-guide">Who Contributed to This Guide<a class="headerlink" href="#introduction-introduction-who-contributed-to-this-guide" title="Permanent link">&para;</a></h2>
1606+
<p>Various experts and thought leaders <a href="#introduction-contributors">contributed to this guide</a>, including those that:</p>
1607+
<ul>
1608+
<li>developed the standards or solutions described in this guide as used in industry</li>
1609+
<li>have many years of experience in vulnerability management across various <a href="#requirements-requirements-personas">roles</a></li>
1610+
</ul>
16051611
<h2 id="introduction-introduction-how-to-contribute-to-this-guide">How to Contribute to This Guide<a class="headerlink" href="#introduction-introduction-how-to-contribute-to-this-guide" title="Permanent link">&para;</a></h2>
16061612
<p>You can contribute content or suggest changes:</p>
16071613
<ul>
@@ -1629,26 +1635,25 @@ <h2 id="introduction-introduction-source-code">Source Code<a class="headerlink"
16291635
</li>
16301636
<li>This code is licensed under the Apache 2 Open Source License.</li>
16311637
</ol>
1638+
<h2 id="introduction-introduction-alternative-or-additional-guidance">Alternative or Additional Guidance<a class="headerlink" href="#introduction-introduction-alternative-or-additional-guidance" title="Permanent link">&para;</a></h2>
1639+
<p>This guide is not an introductory or verbose treatment of topics with broader or background context. For that, consider the following (no affiliation to the authors): </p>
1640+
<ul>
1641+
<li><a href="https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207">Effective Vulnerability Management: Managing <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> in the Vulnerable Digital Ecosystem</a> </li>
1642+
<li><a href="https://www.amazon.com/Software-Transparency-Security-Software-Driven-Society/dp/1394158483/">Software Transparency: Supply Chain Security in an Era of a Software-Driven Society</a></li>
1643+
<li><a href="https://www.amazon.com/Software-Supply-Chain-Security-End/dp/1098133706">Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware</a></li>
1644+
</ul>
16321645
<h2 id="introduction-introduction-notes">Notes<a class="headerlink" href="#introduction-introduction-notes" title="Permanent link">&para;</a></h2>
1646+
<div class="admonition notes">
1647+
<p class="admonition-title">Notes</p>
16331648
<ol>
1634-
<li>
1635-
<p>This guide is not affiliated with any Tool/Company/Vendor/Standard/Forum/Data source. </p>
1636-
<ol>
1637-
<li>Mention of a vendor in this guide is not a recommendation or endorsement of that vendor. <ol>
1638-
<li>The choice of vendors was determined by different contributors who had an interest in that vendor.</li>
1649+
<li>This guide is not affiliated with any Tool/Company/Vendor/Standard/Forum/Data source. <ol>
1650+
<li>Mention of a vendor in this guide is not a recommendation or endorsement of that vendor.
1651+
1. The choice of vendors was determined by different contributors who had an interest in that vendor.</li>
16391652
</ol>
16401653
</li>
1654+
<li>This guide is a living document i.e. it will change and grow over time - with your input.</li>
16411655
</ol>
1642-
</li>
1643-
<li>
1644-
<p>This guide is a living document i.e. it will change and grow over time - with your input.</p>
1645-
</li>
1646-
</ol>
1647-
<h2 id="introduction-introduction-alternative-or-additional-guidance">Alternative or Additional Guidance<a class="headerlink" href="#introduction-introduction-alternative-or-additional-guidance" title="Permanent link">&para;</a></h2>
1648-
<p>This guide is not a verbose treatment of topics with broader or background context. For that, consider the following (no affiliation to the author): </p>
1649-
<ul>
1650-
<li><a href="https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207">Effective Vulnerability Management: Managing <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> in the Vulnerable Digital Ecosystem</a> </li>
1651-
</ul></section><section class="print-page" id="introduction-contributors"><h1 id="introduction-contributors-contributors">Contributors<a class="headerlink" href="#introduction-contributors-contributors" title="Permanent link">&para;</a></h1>
1656+
</div></section><section class="print-page" id="introduction-contributors"><h1 id="introduction-contributors-contributors">Contributors<a class="headerlink" href="#introduction-contributors-contributors" title="Permanent link">&para;</a></h1>
16521657
<p>Thanks to all who contributed! <img alt="🙏" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f64f.svg" title=":pray:" /></p>
16531658
<p>Many experts volunteered their time and knowledge to this guide - and for that
16541659
we all benefit and we're truly grateful!</p>
@@ -1677,7 +1682,12 @@ <h2 id="introduction-contributors-chris-madden">Chris Madden<a class="headerlink
16771682
<p>A large part of that was to be able to prioritize vulnerabilities by Real <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>. </p>
16781683
<p>Lots of dumb questions and data analysis later, this guide represents the distillation of that knowledge into a user-centric system view - what I wish I knew before I started - and learnt by interacting with other users, standards groups, and tool vendors. </p>
16791684
<p>There's a friendly vibrant community in this space - many of whom have contributed to this guide.</p>
1680-
<p>Special thanks to my colleague Lisa for the expert input, keeping all this real, and tolerating more dumb questions than any human should endure in one lifetime!</p></section><section class="print-page" id="introduction-scope"><h1 id="introduction-scope-scope">Scope<a class="headerlink" href="#introduction-scope-scope" title="Permanent link">&para;</a></h1>
1685+
<p><img alt="🙏" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f64f.svg" title=":pray:" /> Special thanks to</p>
1686+
<ol>
1687+
<li>My family <img alt="" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/2764.svg" title=":heart:" /> </li>
1688+
<li>My employer Yahoo for cultivating such a rich environment for people to thrive.</li>
1689+
<li>My colleague Lisa for the expert input, keeping all this real, and tolerating more dumb questions than any human should endure in one lifetime!</li>
1690+
</ol></section><section class="print-page" id="introduction-scope"><h1 id="introduction-scope-scope">Scope<a class="headerlink" href="#introduction-scope-scope" title="Permanent link">&para;</a></h1>
16811691
<div class="admonition abstract">
16821692
<p class="admonition-title">Scope of this Guide</p>
16831693
<p>The scope for this guide is </p>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)