Skip to content

Commit 3b661d8

Browse files
committed
Deployed 5cbb6c3 with MkDocs version: 1.5.3
1 parent 4555210 commit 3b661d8

4 files changed

Lines changed: 141 additions & 5 deletions

File tree

cvss/CVSS/index.html

Lines changed: 118 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -649,6 +649,54 @@
649649
</span>
650650
</a>
651651

652+
</li>
653+
654+
<li class="md-nav__item">
655+
<a href="#dont-use-cvss-base-scores-alone-to-assess-risk" class="md-nav__link">
656+
<span class="md-ellipsis">
657+
Don't use CVSS Base Scores alone to assess risk
658+
</span>
659+
</a>
660+
661+
<nav class="md-nav" aria-label="Don't use CVSS Base Scores alone to assess risk">
662+
<ul class="md-nav__list">
663+
664+
<li class="md-nav__item">
665+
<a href="#cvss-requirements-for-regulated-environments" class="md-nav__link">
666+
<span class="md-ellipsis">
667+
CVSS Requirements for Regulated Environments
668+
</span>
669+
</a>
670+
671+
<nav class="md-nav" aria-label="CVSS Requirements for Regulated Environments">
672+
<ul class="md-nav__list">
673+
674+
<li class="md-nav__item">
675+
<a href="#pci" class="md-nav__link">
676+
<span class="md-ellipsis">
677+
PCI
678+
</span>
679+
</a>
680+
681+
</li>
682+
683+
<li class="md-nav__item">
684+
<a href="#fedramp" class="md-nav__link">
685+
<span class="md-ellipsis">
686+
FedRAMP
687+
</span>
688+
</a>
689+
690+
</li>
691+
692+
</ul>
693+
</nav>
694+
695+
</li>
696+
697+
</ul>
698+
</nav>
699+
652700
</li>
653701

654702
<li class="md-nav__item">
@@ -1341,6 +1389,54 @@
13411389
</span>
13421390
</a>
13431391

1392+
</li>
1393+
1394+
<li class="md-nav__item">
1395+
<a href="#dont-use-cvss-base-scores-alone-to-assess-risk" class="md-nav__link">
1396+
<span class="md-ellipsis">
1397+
Don't use CVSS Base Scores alone to assess risk
1398+
</span>
1399+
</a>
1400+
1401+
<nav class="md-nav" aria-label="Don't use CVSS Base Scores alone to assess risk">
1402+
<ul class="md-nav__list">
1403+
1404+
<li class="md-nav__item">
1405+
<a href="#cvss-requirements-for-regulated-environments" class="md-nav__link">
1406+
<span class="md-ellipsis">
1407+
CVSS Requirements for Regulated Environments
1408+
</span>
1409+
</a>
1410+
1411+
<nav class="md-nav" aria-label="CVSS Requirements for Regulated Environments">
1412+
<ul class="md-nav__list">
1413+
1414+
<li class="md-nav__item">
1415+
<a href="#pci" class="md-nav__link">
1416+
<span class="md-ellipsis">
1417+
PCI
1418+
</span>
1419+
</a>
1420+
1421+
</li>
1422+
1423+
<li class="md-nav__item">
1424+
<a href="#fedramp" class="md-nav__link">
1425+
<span class="md-ellipsis">
1426+
FedRAMP
1427+
</span>
1428+
</a>
1429+
1430+
</li>
1431+
1432+
</ul>
1433+
</nav>
1434+
1435+
</li>
1436+
1437+
</ul>
1438+
</nav>
1439+
13441440
</li>
13451441

13461442
<li class="md-nav__item">
@@ -1454,9 +1550,10 @@ <h2 id="cvss-severity-rating-scale"><abbr title="Common Vulnerability Scoring Sy
14541550
<li>&gt;96% of CVEs are ranked Medium or higher (4+)</li>
14551551
</ol>
14561552
</div>
1553+
<h2 id="dont-use-cvss-base-scores-alone-to-assess-risk">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk<a class="headerlink" href="#dont-use-cvss-base-scores-alone-to-assess-risk" title="Permanent link">&para;</a></h2>
14571554
<div class="admonition tip">
1458-
<p class="admonition-title">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores alone to assess risk.</p>
1459-
<p>Many organizations use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores alone to assess risk despite repeated guidance against this. </p>
1555+
<p class="admonition-title">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk.</p>
1556+
<p>Many organizations use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk despite repeated guidance against this. </p>
14601557
<p><strong>A Critical or High <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity is not the same as a Critical or High <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</strong></p>
14611558
<p><strong>There's a ~10x difference in counts of CVEs</strong> for these 2 groups:</p>
14621559
<ul>
@@ -1468,11 +1565,30 @@ <h2 id="cvss-severity-rating-scale"><abbr title="Common Vulnerability Scoring Sy
14681565
<p><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>-B) scores are designed to measure the severity of a vulnerability and should not be used alone to assess risk. </p>
14691566
<p><a href="https://www.first.org/cvss/v4.0/user-guide#CVSS-Base-Score-CVSS-B-Measures-Severity-not-Risk">https://www.first.org/cvss/v4.0/user-guide#CVSS-Base-Score-CVSS-B-Measures-Severity-not-Risk</a></p>
14701567
</div>
1568+
</div>
1569+
<h3 id="cvss-requirements-for-regulated-environments"><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Requirements for Regulated Environments<a class="headerlink" href="#cvss-requirements-for-regulated-environments" title="Permanent link">&para;</a></h3>
1570+
<p>Some Regulated Environments requirements appear to conflict with this guidance 🤔</p>
1571+
<h4 id="pci">PCI<a class="headerlink" href="#pci" title="Permanent link">&para;</a></h4>
1572+
<div class="admonition quote">
1573+
<p class="admonition-title">Quote</p>
1574+
<p>The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands. It was created to better control cardholder data and reduce credit card fraud. Validation of compliance is performed annually or quarterly with a method suited to the volume of transactions</p>
1575+
<p><a href="https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard">https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard</a></p>
1576+
</div>
14711577
<div class="admonition quote">
14721578
<p class="admonition-title">Quote</p>
14731579
<p>PCI DSS 4.0 11.3.2.1 “External vulnerability scans are performed after any significant change as follows: Vulnerabilities that are scored <strong>4.0 or higher by the <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr></strong> are resolved.”</p>
14741580
<p><a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf</a></p>
14751581
</div>
1582+
<h4 id="fedramp">FedRAMP<a class="headerlink" href="#fedramp" title="Permanent link">&para;</a></h4>
1583+
<div class="admonition quote">
1584+
<p class="admonition-title">Quote</p>
1585+
<p>The Federal <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> and Authorization Management Program (FedRAMP) is a United States federal government-wide compliance program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services <a href="https://en.wikipedia.org/wiki/FedRAMP">https://en.wikipedia.org/wiki/FedRAMP</a></p>
1586+
</div>
1587+
<div class="admonition quote">
1588+
<p class="admonition-title">Quote</p>
1589+
<p>3.0 Scanning Requirements</p>
1590+
<p>Common Vulnerability Scoring System (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>) <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Scoring: For any vulnerability with a CVSSv3 base score assigned in the latest version of the <abbr title="National Vulnerability Database">NVD</abbr>, <strong>the CVSSv3 base score must be used as the original risk rating</strong>. If no CVSSv3 score is available, a CVSSv2 base score is acceptable where available. If no <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score is available, the native scanner base risk score can be used.</p>
1591+
<p><a href="https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf">https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf</a></p>
14761592
</div>
14771593
<h2 id="cvss-confidentiality-integrity-availability-impacts"><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Confidentiality, Integrity, Availability Impacts<a class="headerlink" href="#cvss-confidentiality-integrity-availability-impacts" title="Permanent link">&para;</a></h2>
14781594
<div class="admonition quote">

print_page/index.html

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2659,9 +2659,10 @@ <h2 id="cvss-cvss-cvss-severity-rating-scale"><abbr title="Common Vulnerability
26592659
<li>&gt;96% of CVEs are ranked Medium or higher (4+)</li>
26602660
</ol>
26612661
</div>
2662+
<h2 id="cvss-cvss-dont-use-cvss-base-scores-alone-to-assess-risk">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk<a class="headerlink" href="#cvss-cvss-dont-use-cvss-base-scores-alone-to-assess-risk" title="Permanent link">&para;</a></h2>
26622663
<div class="admonition tip">
2663-
<p class="admonition-title">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores alone to assess risk.</p>
2664-
<p>Many organizations use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores alone to assess risk despite repeated guidance against this. </p>
2664+
<p class="admonition-title">Don't use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk.</p>
2665+
<p>Many organizations use <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Scores alone to assess risk despite repeated guidance against this. </p>
26652666
<p><strong>A Critical or High <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity is not the same as a Critical or High <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</strong></p>
26662667
<p><strong>There's a ~10x difference in counts of CVEs</strong> for these 2 groups:</p>
26672668
<ul>
@@ -2673,11 +2674,30 @@ <h2 id="cvss-cvss-cvss-severity-rating-scale"><abbr title="Common Vulnerability
26732674
<p><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>-B) scores are designed to measure the severity of a vulnerability and should not be used alone to assess risk. </p>
26742675
<p><a href="https://www.first.org/cvss/v4.0/user-guide#CVSS-Base-Score-CVSS-B-Measures-Severity-not-Risk">https://www.first.org/cvss/v4.0/user-guide#CVSS-Base-Score-CVSS-B-Measures-Severity-not-Risk</a></p>
26752676
</div>
2677+
</div>
2678+
<h3 id="cvss-cvss-cvss-requirements-for-regulated-environments"><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Requirements for Regulated Environments<a class="headerlink" href="#cvss-cvss-cvss-requirements-for-regulated-environments" title="Permanent link">&para;</a></h3>
2679+
<p>Some Regulated Environments requirements appear to conflict with this guidance 🤔</p>
2680+
<h4 id="cvss-cvss-pci">PCI<a class="headerlink" href="#cvss-cvss-pci" title="Permanent link">&para;</a></h4>
2681+
<div class="admonition quote">
2682+
<p class="admonition-title">Quote</p>
2683+
<p>The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands. It was created to better control cardholder data and reduce credit card fraud. Validation of compliance is performed annually or quarterly with a method suited to the volume of transactions</p>
2684+
<p><a href="https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard">https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard</a></p>
2685+
</div>
26762686
<div class="admonition quote">
26772687
<p class="admonition-title">Quote</p>
26782688
<p>PCI DSS 4.0 11.3.2.1 “External vulnerability scans are performed after any significant change as follows: Vulnerabilities that are scored <strong>4.0 or higher by the <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr></strong> are resolved.”</p>
26792689
<p><a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf</a></p>
26802690
</div>
2691+
<h4 id="cvss-cvss-fedramp">FedRAMP<a class="headerlink" href="#cvss-cvss-fedramp" title="Permanent link">&para;</a></h4>
2692+
<div class="admonition quote">
2693+
<p class="admonition-title">Quote</p>
2694+
<p>The Federal <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> and Authorization Management Program (FedRAMP) is a United States federal government-wide compliance program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services <a href="https://en.wikipedia.org/wiki/FedRAMP">https://en.wikipedia.org/wiki/FedRAMP</a></p>
2695+
</div>
2696+
<div class="admonition quote">
2697+
<p class="admonition-title">Quote</p>
2698+
<p>3.0 Scanning Requirements</p>
2699+
<p>Common Vulnerability Scoring System (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>) <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Scoring: For any vulnerability with a CVSSv3 base score assigned in the latest version of the <abbr title="National Vulnerability Database">NVD</abbr>, <strong>the CVSSv3 base score must be used as the original risk rating</strong>. If no CVSSv3 score is available, a CVSSv2 base score is acceptable where available. If no <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score is available, the native scanner base risk score can be used.</p>
2700+
<p><a href="https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf">https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf</a></p>
26812701
</div>
26822702
<h2 id="cvss-cvss-cvss-confidentiality-integrity-availability-impacts"><abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Confidentiality, Integrity, Availability Impacts<a class="headerlink" href="#cvss-cvss-cvss-confidentiality-integrity-availability-impacts" title="Permanent link">&para;</a></h2>
26832703
<div class="admonition quote">

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)