Skip to content

Commit 7e0d229

Browse files
committed
Deployed c307d7f with MkDocs version: 1.5.3
1 parent 64fdeb0 commit 7e0d229

5 files changed

Lines changed: 7 additions & 5 deletions

File tree

introduction/Introduction/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1454,7 +1454,7 @@
14541454
<h1 id="introduction">Introduction<a class="headerlink" href="#introduction" title="Permanent link">&para;</a></h1>
14551455
<div class="admonition abstract">
14561456
<p class="admonition-title">About this Guide</p>
1457-
<p>This <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of risk, the related standards and data sources, and how you can apply them for an effective <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1457+
<p>This <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of <a href="../Scope/#per-vulnerability">Relative <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per Vulnerability</a>, the related standards and data sources, and how you can apply them for an effective <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
14581458
<p>It is written by, or contributed to, some of the thought leaders in this space <strong>for YOU.</strong></p>
14591459
<p><a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr></a>, <a href="https://www.gartner.com/smarterwithgartner/focus-on-the-biggest-security-threats-not-the-most-publicized">Gartner</a>, and others, recommend focusing on vulnerabilities that are known-exploited as an effective approach to risk mitigation and prevention, yet very few organizations do this. </p>
14601460
<p>Maybe because they don't know they should, why they should, or how they should? This guide will cover all these points.</p>

introduction/Scope/index.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1341,7 +1341,8 @@ <h2 id="per-vulnerability">Per Vulnerability<a class="headerlink" href="#per-vul
13411341
<p>The scope is
13421342
- "Per Vulnerability" branch in the diagram below
13431343
- Generic vulnerability data - not the organization-specific context</p>
1344-
<p>A different way of looking at this is that this guide can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1344+
<p>A different way of looking at this is that this guide (and the prioritization schemes herein), can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1345+
<p>In other words, Relative <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per vulnerability.</p>
13451346
<figure>
13461347
<p><img alt="Image title" src="../../assets/images/risk_remediation_taxonomy.png" /></p>
13471348
<figcaption>The scope for this guide is the "Per Vulnerability" branch</figcaption>

print_page/index.html

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1528,7 +1528,7 @@ <h1 class='nav-section-title' id='section-introduction'>
15281528
<section class="print-page" id="introduction-introduction"><h1 id="introduction-introduction-introduction">Introduction<a class="headerlink" href="#introduction-introduction-introduction" title="Permanent link">&para;</a></h1>
15291529
<div class="admonition abstract">
15301530
<p class="admonition-title">About this Guide</p>
1531-
<p>This <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of risk, the related standards and data sources, and how you can apply them for an effective <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1531+
<p>This <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of <a href="#introduction-scope-per-vulnerability">Relative <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per Vulnerability</a>, the related standards and data sources, and how you can apply them for an effective <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
15321532
<p>It is written by, or contributed to, some of the thought leaders in this space <strong>for YOU.</strong></p>
15331533
<p><a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr></a>, <a href="https://www.gartner.com/smarterwithgartner/focus-on-the-biggest-security-threats-not-the-most-publicized">Gartner</a>, and others, recommend focusing on vulnerabilities that are known-exploited as an effective approach to risk mitigation and prevention, yet very few organizations do this. </p>
15341534
<p>Maybe because they don't know they should, why they should, or how they should? This guide will cover all these points.</p>
@@ -1706,7 +1706,8 @@ <h2 id="introduction-scope-per-vulnerability">Per Vulnerability<a class="headerl
17061706
<p>The scope is
17071707
- "Per Vulnerability" branch in the diagram below
17081708
- Generic vulnerability data - not the organization-specific context</p>
1709-
<p>A different way of looking at this is that this guide can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1709+
<p>A different way of looking at this is that this guide (and the prioritization schemes herein), can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1710+
<p>In other words, Relative <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per vulnerability.</p>
17101711
<figure>
17111712
<p><img alt="Image title" src="../assets/images/risk_remediation_taxonomy.png" /></p>
17121713
<figcaption>The scope for this guide is the "Per Vulnerability" branch</figcaption>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)