Skip to content

Commit c3c5226

Browse files
committed
Deployed 963d38b with MkDocs version: 1.5.3
1 parent c166a2b commit c3c5226

7 files changed

Lines changed: 30 additions & 12 deletions

File tree

-34.6 KB
Loading

organizations/acme/Applied/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1523,7 +1523,7 @@ <h2 id="regulated-environment">Regulated Environment<a class="headerlink" href="
15231523
</ul>
15241524
<p>A CVEs "scored 4.0 or higher by the <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>" is pretty much all CVEs
15251525
(&gt;96%) per "<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity Rating Scale"</p>
1526-
<p>The organization uses <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score and "Likelihood of Exploit" to
1526+
<p>The organization uses <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score and "Likelihood of Exploitation" to
15271527
prioritize CVEs for the <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> threshold required by regulation.
15281528
Specifically it uses:</p>
15291529
<ol>

print_page/index.html

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4983,7 +4983,7 @@ <h3 id="vendors-qualys-comparison-of-cves-with-qualys-qvs-and-epss-scores"><stro
49834983
<p class="admonition-title">Takeaways</p>
49844984
<ol>
49854985
<li>"The focus should be given to CVEs known to be exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</li>
4986-
<li>The Qualys scoring / priority for "Likelihood of Exploit" factors is in this order<ol>
4986+
<li>The Qualys scoring / priority for "Likelihood of Exploitation" factors is in this order<ol>
49874987
<li>known to be exploited in the wild </li>
49884988
<li>weaponized exploits </li>
49894989
<li>PoC exploits.</li>
@@ -5452,6 +5452,11 @@ <h3 id="risk-rbp_schemes-cvss-base-score-ratings-with-exploitation-focus"><abbr
54525452
<p>A simple illustrative scheme that combines Base Score Ratings with Exploitation status is defined here.</p>
54535453
<ul>
54545454
<li><a href="#vendors-qualys-in-depth-look-into-data-driven-science-behind-qualys-trurisk">Qualys TruRisk</a> is an example of this type of scheme.</li>
5455+
<li>
5456+
<div class="admonition quote">
5457+
<p class="admonition-title">Quote</p>
5458+
"The focus should be given to CVEs known to be exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</div>
5459+
</li>
54555460
</ul>
54565461
<table>
54575462
<thead>
@@ -5465,22 +5470,22 @@ <h3 id="risk-rbp_schemes-cvss-base-score-ratings-with-exploitation-focus"><abbr
54655470
<tr>
54665471
<td>10</td>
54675472
<td>critical</td>
5468-
<td>kev</td>
5473+
<td>kev or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
54695474
</tr>
54705475
<tr>
54715476
<td>9</td>
54725477
<td>critical</td>
5473-
<td>weaponized</td>
5478+
<td>weaponized or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
54745479
</tr>
54755480
<tr>
54765481
<td>8</td>
54775482
<td>high</td>
5478-
<td>kev</td>
5483+
<td>kev or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
54795484
</tr>
54805485
<tr>
54815486
<td>7</td>
54825487
<td>high</td>
5483-
<td>weaponized</td>
5488+
<td>weaponized or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
54845489
</tr>
54855490
<tr>
54865491
<td>6</td>
@@ -5535,6 +5540,10 @@ <h3 id="risk-rbp_schemes-cvss-base-score-ratings-with-exploitation-focus"><abbr
55355540
<td>poc (Proof Of Concept)</td>
55365541
<td>poc_github or exploitdb</td>
55375542
</tr>
5543+
<tr>
5544+
<td><abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
5545+
<td><abbr title="Exploit Prediction Scoring System">EPSS</abbr> Score &gt;= 10%</td>
5546+
</tr>
55385547
</tbody>
55395548
</table>
55405549
<figure>

risk/Rbp_schemes/index.html

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1605,6 +1605,11 @@ <h3 id="cvss-base-score-ratings-with-exploitation-focus"><abbr title="Common Vul
16051605
<p>A simple illustrative scheme that combines Base Score Ratings with Exploitation status is defined here.</p>
16061606
<ul>
16071607
<li><a href="../../vendors/Qualys/#in-depth-look-into-data-driven-science-behind-qualys-trurisk">Qualys TruRisk</a> is an example of this type of scheme.</li>
1608+
<li>
1609+
<div class="admonition quote">
1610+
<p class="admonition-title">Quote</p>
1611+
"The focus should be given to CVEs known to be exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</div>
1612+
</li>
16081613
</ul>
16091614
<table>
16101615
<thead>
@@ -1618,22 +1623,22 @@ <h3 id="cvss-base-score-ratings-with-exploitation-focus"><abbr title="Common Vul
16181623
<tr>
16191624
<td>10</td>
16201625
<td>critical</td>
1621-
<td>kev</td>
1626+
<td>kev or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
16221627
</tr>
16231628
<tr>
16241629
<td>9</td>
16251630
<td>critical</td>
1626-
<td>weaponized</td>
1631+
<td>weaponized or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
16271632
</tr>
16281633
<tr>
16291634
<td>8</td>
16301635
<td>high</td>
1631-
<td>kev</td>
1636+
<td>kev or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
16321637
</tr>
16331638
<tr>
16341639
<td>7</td>
16351640
<td>high</td>
1636-
<td>weaponized</td>
1641+
<td>weaponized or <abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
16371642
</tr>
16381643
<tr>
16391644
<td>6</td>
@@ -1688,6 +1693,10 @@ <h3 id="cvss-base-score-ratings-with-exploitation-focus"><abbr title="Common Vul
16881693
<td>poc (Proof Of Concept)</td>
16891694
<td>poc_github or exploitdb</td>
16901695
</tr>
1696+
<tr>
1697+
<td><abbr title="Exploit Prediction Scoring System">EPSS</abbr> High</td>
1698+
<td><abbr title="Exploit Prediction Scoring System">EPSS</abbr> Score &gt;= 10%</td>
1699+
</tr>
16911700
</tbody>
16921701
</table>
16931702
<figure>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

vendors/Qualys/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1704,7 +1704,7 @@ <h3 id="comparison-of-cves-with-qualys-qvs-and-epss-scores"><strong>Comparison o
17041704
<p class="admonition-title">Takeaways</p>
17051705
<ol>
17061706
<li>"The focus should be given to CVEs known to be exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</li>
1707-
<li>The Qualys scoring / priority for "Likelihood of Exploit" factors is in this order<ol>
1707+
<li>The Qualys scoring / priority for "Likelihood of Exploitation" factors is in this order<ol>
17081708
<li>known to be exploited in the wild </li>
17091709
<li>weaponized exploits </li>
17101710
<li>PoC exploits.</li>

0 commit comments

Comments
 (0)