Skip to content

Commit e36a9f7

Browse files
committed
Deployed 17a2635 with MkDocs version: 1.5.3
1 parent ecf2dc3 commit e36a9f7

File tree

5 files changed

+49
-39
lines changed

5 files changed

+49
-39
lines changed

print_page/index.html

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4938,6 +4938,11 @@ <h1 class='nav-section-title' id='section-vendors'>
49384938
<td>Phoenix Security adopts a refined approach to contextual vulnerability management, integrating a sophisticated risk formula that quantifies vulnerabilities on a scale from 0 to 1000. This method encompasses three principal components: base severity, the weighted likelihood of exploitation, and the weighted business impact at the vulnerability level. <br><strong>Base Severity</strong>: Establishes the inherent risk posed by a vulnerability, serving as the foundational risk assessment metric. <br><strong>Weighted Likelihood of Exploitation</strong>: This factor evaluates the probability of a vulnerability being exploited, incorporating contextual elements such as externability, cyber threat intelligence (with the Exploit Prediction Scoring System <abbr title="Exploit Prediction Scoring System">EPSS</abbr> among the key indicators), <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> Known Exploited Vulnerabilities (<abbr title="Known Exploited Vulnerability">KEV</abbr>), exploit availability, and exploit maturity levels (Proof of Concept, Exploitable, Weaponizable). <br><strong>Weighted Business Impact</strong>: Assesses the potential impact of a vulnerability on business operations, factoring in both a user-assigned impact score (1-10 scale) and financial implications. This dimension does not directly influence the overall risk score through financial impact but provides a comprehensive view of the potential operational disruption. Vulnerabilities are systematically categorized across assets, applications, and environments, enhancing the precision of risk assessment. The likelihood of exploitation is detailed by combining external vulnerability data, threat intelligence, and the presence and maturity of exploits. Business impact evaluation includes user input and financial impact assessments, albeit without affecting the overall risk score.\<abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> aggregation considers asset criticality, whether an asset is internal or external, the volume of vulnerabilities, and groups them in ranges for effective prioritization and management. <br><br>This structured approach enables Phoenix Security to deliver a nuanced, actionable framework for addressing vulnerabilities in a targeted manner.Details on the risk formula are available here: <a href="https://phoenix.security/phoenix-security-act-on-risk-calculation/">https://phoenix.security/phoenix-security-act-on-risk-calculation/</a> For FAQ: <a href="https://phoenix.security/faqs/">https://phoenix.security/faqs/</a> .</td>
49394939
<td>✅</td>
49404940
</tr>
4941+
<tr>
4942+
<td><strong>Amazon</strong></td>
4943+
<td>Amazon Inspector offers continuous vulnerability scanning for AWS EC2, ECR, and Lambda resources. Inspector provides findings with <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores, Common Vulnerability Scoring System (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>) scores, and Common Weakness Enumeration identifiers (<abbr title="CWE Common Weakness Enumeration">CWE</abbr>). Findings are created using intelligence from the <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> Known Exploited Vulnerabilities (<abbr title="Known Exploited Vulnerability">KEV</abbr>) Catalog and 50+ sources. <a href="https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html">https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html</a> <br> Amazon Inspector also offers stateless scanning in CI/CD workflows. Here, findings are returned as CycloneDX SBOMs containing <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores, <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> scores, and CWEs. This functionality can be used with a supported CI/CD plugin <a href="https://docs.aws.amazon.com/inspector/latest/user/scanning-cicd.html#plugin-integration">https://docs.aws.amazon.com/inspector/latest/user/scanning-cicd.html#plugin-integration</a> or with the AWS CLI <a href="https://awscli.amazonaws.com/v2/documentation/api/latest/reference/inspector-scan/scan-sbom.html">https://awscli.amazonaws.com/v2/documentation/api/latest/reference/inspector-scan/scan-sbom.html</a></td>
4944+
<td>✅</td>
4945+
</tr>
49414946
</tbody>
49424947
</table>
49434948
<div class="admonition warning">

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -2,192 +2,192 @@
22
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
33
<url>
44
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/</loc>
5-
<lastmod>2024-07-01</lastmod>
5+
<lastmod>2024-08-28</lastmod>
66
<changefreq>daily</changefreq>
77
</url>
88
<url>
99
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/annex/Glossary/</loc>
10-
<lastmod>2024-07-01</lastmod>
10+
<lastmod>2024-08-28</lastmod>
1111
<changefreq>daily</changefreq>
1212
</url>
1313
<url>
1414
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/cisa_kev/cisa_kev/</loc>
15-
<lastmod>2024-07-01</lastmod>
15+
<lastmod>2024-08-28</lastmod>
1616
<changefreq>daily</changefreq>
1717
</url>
1818
<url>
1919
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/cvss/CVSS/</loc>
20-
<lastmod>2024-07-01</lastmod>
20+
<lastmod>2024-08-28</lastmod>
2121
<changefreq>daily</changefreq>
2222
</url>
2323
<url>
2424
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/epss/Applying_EPSS_to_your_environment/</loc>
25-
<lastmod>2024-07-01</lastmod>
25+
<lastmod>2024-08-28</lastmod>
2626
<changefreq>daily</changefreq>
2727
</url>
2828
<url>
2929
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/epss/EPSS_Thresholds/</loc>
30-
<lastmod>2024-07-01</lastmod>
30+
<lastmod>2024-08-28</lastmod>
3131
<changefreq>daily</changefreq>
3232
</url>
3333
<url>
3434
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/epss/EPSS_and_CISA_KEV/</loc>
35-
<lastmod>2024-07-01</lastmod>
35+
<lastmod>2024-08-28</lastmod>
3636
<changefreq>daily</changefreq>
3737
</url>
3838
<url>
3939
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/epss/Introduction_to_EPSS/</loc>
40-
<lastmod>2024-07-01</lastmod>
40+
<lastmod>2024-08-28</lastmod>
4141
<changefreq>daily</changefreq>
4242
</url>
4343
<url>
4444
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/epss/What_users_ask_for/</loc>
45-
<lastmod>2024-07-01</lastmod>
45+
<lastmod>2024-08-28</lastmod>
4646
<changefreq>daily</changefreq>
4747
</url>
4848
<url>
4949
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/includes/abbreviations/</loc>
50-
<lastmod>2024-07-01</lastmod>
50+
<lastmod>2024-08-28</lastmod>
5151
<changefreq>daily</changefreq>
5252
</url>
5353
<url>
5454
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/includes/epss_threshold/</loc>
55-
<lastmod>2024-07-01</lastmod>
55+
<lastmod>2024-08-28</lastmod>
5656
<changefreq>daily</changefreq>
5757
</url>
5858
<url>
5959
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/includes/plots_cvss_epss/</loc>
60-
<lastmod>2024-07-01</lastmod>
60+
<lastmod>2024-08-28</lastmod>
6161
<changefreq>daily</changefreq>
6262
</url>
6363
<url>
6464
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/includes/vendor_warning/</loc>
65-
<lastmod>2024-07-01</lastmod>
65+
<lastmod>2024-08-28</lastmod>
6666
<changefreq>daily</changefreq>
6767
</url>
6868
<url>
6969
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/includes/vulns_exploited/</loc>
70-
<lastmod>2024-07-01</lastmod>
70+
<lastmod>2024-08-28</lastmod>
7171
<changefreq>daily</changefreq>
7272
</url>
7373
<url>
7474
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/Introduction/</loc>
75-
<lastmod>2024-07-01</lastmod>
75+
<lastmod>2024-08-28</lastmod>
7676
<changefreq>daily</changefreq>
7777
</url>
7878
<url>
7979
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/Scope/</loc>
80-
<lastmod>2024-07-01</lastmod>
80+
<lastmod>2024-08-28</lastmod>
8181
<changefreq>daily</changefreq>
8282
</url>
8383
<url>
8484
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/code_and_data/</loc>
85-
<lastmod>2024-07-01</lastmod>
85+
<lastmod>2024-08-28</lastmod>
8686
<changefreq>daily</changefreq>
8787
</url>
8888
<url>
8989
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/contributors/</loc>
90-
<lastmod>2024-07-01</lastmod>
90+
<lastmod>2024-08-28</lastmod>
9191
<changefreq>daily</changefreq>
9292
</url>
9393
<url>
9494
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/foreword/</loc>
95-
<lastmod>2024-07-01</lastmod>
95+
<lastmod>2024-08-28</lastmod>
9696
<changefreq>daily</changefreq>
9797
</url>
9898
<url>
9999
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/introduction/preface/</loc>
100-
<lastmod>2024-07-01</lastmod>
100+
<lastmod>2024-08-28</lastmod>
101101
<changefreq>daily</changefreq>
102102
</url>
103103
<url>
104104
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/organizations/Yahoo/</loc>
105-
<lastmod>2024-07-01</lastmod>
105+
<lastmod>2024-08-28</lastmod>
106106
<changefreq>daily</changefreq>
107107
</url>
108108
<url>
109109
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/organizations/acme/Applied/</loc>
110-
<lastmod>2024-07-01</lastmod>
110+
<lastmod>2024-08-28</lastmod>
111111
<changefreq>daily</changefreq>
112112
</url>
113113
<url>
114114
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/requirements/Requirements/</loc>
115-
<lastmod>2024-07-01</lastmod>
115+
<lastmod>2024-08-28</lastmod>
116116
<changefreq>daily</changefreq>
117117
</url>
118118
<url>
119119
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Back_of_napkin/</loc>
120-
<lastmod>2024-07-01</lastmod>
120+
<lastmod>2024-08-28</lastmod>
121121
<changefreq>daily</changefreq>
122122
</url>
123123
<url>
124124
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Data_Sources/</loc>
125-
<lastmod>2024-07-01</lastmod>
125+
<lastmod>2024-08-28</lastmod>
126126
<changefreq>daily</changefreq>
127127
</url>
128128
<url>
129129
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Log4Shell/</loc>
130-
<lastmod>2024-07-01</lastmod>
130+
<lastmod>2024-08-28</lastmod>
131131
<changefreq>daily</changefreq>
132132
</url>
133133
<url>
134134
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Rbp_schemes/</loc>
135-
<lastmod>2024-07-01</lastmod>
135+
<lastmod>2024-08-28</lastmod>
136136
<changefreq>daily</changefreq>
137137
</url>
138138
<url>
139139
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Takeaway/</loc>
140-
<lastmod>2024-07-01</lastmod>
140+
<lastmod>2024-08-28</lastmod>
141141
<changefreq>daily</changefreq>
142142
</url>
143143
<url>
144144
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Understanding_Risk/</loc>
145-
<lastmod>2024-07-01</lastmod>
145+
<lastmod>2024-08-28</lastmod>
146146
<changefreq>daily</changefreq>
147147
</url>
148148
<url>
149149
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/risk/Vulnerability_Landscape/</loc>
150-
<lastmod>2024-07-01</lastmod>
150+
<lastmod>2024-08-28</lastmod>
151151
<changefreq>daily</changefreq>
152152
</url>
153153
<url>
154154
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/ssvc/SSVC/</loc>
155-
<lastmod>2024-07-01</lastmod>
155+
<lastmod>2024-08-28</lastmod>
156156
<changefreq>daily</changefreq>
157157
</url>
158158
<url>
159159
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/ssvc/decision_trees/</loc>
160-
<lastmod>2024-07-01</lastmod>
160+
<lastmod>2024-08-28</lastmod>
161161
<changefreq>daily</changefreq>
162162
</url>
163163
<url>
164164
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/ssvc/decision_trees_from_scratch/</loc>
165-
<lastmod>2024-07-01</lastmod>
165+
<lastmod>2024-08-28</lastmod>
166166
<changefreq>daily</changefreq>
167167
</url>
168168
<url>
169169
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/talks/talks/</loc>
170-
<lastmod>2024-07-01</lastmod>
170+
<lastmod>2024-08-28</lastmod>
171171
<changefreq>daily</changefreq>
172172
</url>
173173
<url>
174174
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/vendors/Edgescan/</loc>
175-
<lastmod>2024-07-01</lastmod>
175+
<lastmod>2024-08-28</lastmod>
176176
<changefreq>daily</changefreq>
177177
</url>
178178
<url>
179179
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/vendors/Microsoft_Exploitability_Index/</loc>
180-
<lastmod>2024-07-01</lastmod>
180+
<lastmod>2024-08-28</lastmod>
181181
<changefreq>daily</changefreq>
182182
</url>
183183
<url>
184184
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/vendors/Qualys/</loc>
185-
<lastmod>2024-07-01</lastmod>
185+
<lastmod>2024-08-28</lastmod>
186186
<changefreq>daily</changefreq>
187187
</url>
188188
<url>
189189
<loc>https://github.com/RiskBasedPrioritization/RiskBasedPrioritization.github.io/vendors/vendors/</loc>
190-
<lastmod>2024-07-01</lastmod>
190+
<lastmod>2024-08-28</lastmod>
191191
<changefreq>daily</changefreq>
192192
</url>
193193
</urlset>

sitemap.xml.gz

0 Bytes
Binary file not shown.

vendors/vendors/index.html

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1479,6 +1479,11 @@ <h1>Vendors</h1>
14791479
<td>Phoenix Security adopts a refined approach to contextual vulnerability management, integrating a sophisticated risk formula that quantifies vulnerabilities on a scale from 0 to 1000. This method encompasses three principal components: base severity, the weighted likelihood of exploitation, and the weighted business impact at the vulnerability level. <br><strong>Base Severity</strong>: Establishes the inherent risk posed by a vulnerability, serving as the foundational risk assessment metric. <br><strong>Weighted Likelihood of Exploitation</strong>: This factor evaluates the probability of a vulnerability being exploited, incorporating contextual elements such as externability, cyber threat intelligence (with the Exploit Prediction Scoring System <abbr title="Exploit Prediction Scoring System">EPSS</abbr> among the key indicators), <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> Known Exploited Vulnerabilities (<abbr title="Known Exploited Vulnerability">KEV</abbr>), exploit availability, and exploit maturity levels (Proof of Concept, Exploitable, Weaponizable). <br><strong>Weighted Business Impact</strong>: Assesses the potential impact of a vulnerability on business operations, factoring in both a user-assigned impact score (1-10 scale) and financial implications. This dimension does not directly influence the overall risk score through financial impact but provides a comprehensive view of the potential operational disruption. Vulnerabilities are systematically categorized across assets, applications, and environments, enhancing the precision of risk assessment. The likelihood of exploitation is detailed by combining external vulnerability data, threat intelligence, and the presence and maturity of exploits. Business impact evaluation includes user input and financial impact assessments, albeit without affecting the overall risk score.\<abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> aggregation considers asset criticality, whether an asset is internal or external, the volume of vulnerabilities, and groups them in ranges for effective prioritization and management. <br><br>This structured approach enables Phoenix Security to deliver a nuanced, actionable framework for addressing vulnerabilities in a targeted manner.Details on the risk formula are available here: <a href="https://phoenix.security/phoenix-security-act-on-risk-calculation/">https://phoenix.security/phoenix-security-act-on-risk-calculation/</a> For FAQ: <a href="https://phoenix.security/faqs/">https://phoenix.security/faqs/</a> .</td>
14801480
<td></td>
14811481
</tr>
1482+
<tr>
1483+
<td><strong>Amazon</strong></td>
1484+
<td>Amazon Inspector offers continuous vulnerability scanning for AWS EC2, ECR, and Lambda resources. Inspector provides findings with <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores, Common Vulnerability Scoring System (<abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>) scores, and Common Weakness Enumeration identifiers (<abbr title="CWE Common Weakness Enumeration">CWE</abbr>). Findings are created using intelligence from the <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> Known Exploited Vulnerabilities (<abbr title="Known Exploited Vulnerability">KEV</abbr>) Catalog and 50+ sources. <a href="https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html">https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html</a> <br> Amazon Inspector also offers stateless scanning in CI/CD workflows. Here, findings are returned as CycloneDX SBOMs containing <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores, <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> scores, and CWEs. This functionality can be used with a supported CI/CD plugin <a href="https://docs.aws.amazon.com/inspector/latest/user/scanning-cicd.html#plugin-integration">https://docs.aws.amazon.com/inspector/latest/user/scanning-cicd.html#plugin-integration</a> or with the AWS CLI <a href="https://awscli.amazonaws.com/v2/documentation/api/latest/reference/inspector-scan/scan-sbom.html">https://awscli.amazonaws.com/v2/documentation/api/latest/reference/inspector-scan/scan-sbom.html</a></td>
1485+
<td></td>
1486+
</tr>
14821487
</tbody>
14831488
</table>
14841489
<div class="admonition warning">

0 commit comments

Comments
 (0)