-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Additional metadata such as prioritization scores for vulnerabilities #462
Comments
@sei-vsarvepalli it is just an example stated, I understand, but the values look a bit volatile. Can you maybe kindly provide a link to a schema file? Poking around in the repository I found many interesting things but no schema definition I recognized. Thanks. That would help me - and I guess the other TC members as well - a lot to support you in your endeavor. |
@sei-vsarvepalli I like the idea of including SSVC - it was already on the list. However, I had a look at the schema and IMHO we need to work a little bit on it before we can include that. I'm happy to help with the work one we have the CSD02 out. Maybe that including SSVC is something for CSAF 2.x? Here are some points, I think we need address:
|
Hello @sthagen Thanks for such a quick response. The schema for the "content" object comes from here. The "metrics" is a way to potentially update your schema to provide score containers that can be SSVC or other options like EPSS that are being explored as potential candidates for the challenging vulnerability prioritization problem. An example result that uses a computed schema is in the link below: |
Hello Tomas, The id field is unique identifier for each vulnerability.
As far as other issues CSAF current Thanks |
The schema seems to add a very open extension point. This producers can already achieve by using the non-strict CSAF mode, where they can inject any objects they like and that do not conflict with specified names (per the CSAF version in use - currently I can very well imagine that future CSAF versions will introduce a So, maybe you want to inject with a safer name, decorated with a namespace guard? When the CSAF v2.0 iteration is done, maybe we can exchange more specific ideas on how to define real metrics that are both useful to produce and (which I am missing from the given schema and examples) automate. |
Hello @sthagen Thanks for considering this and the option to use the "non-strict" CSAF schema. I had some discussions with @tschmidtb51 as well on potential way forward into CSAF 2.x as it evolves as well (like you mentioned). Finally, the result we are really after is to enable operators to prioritize vulnerabilities. So even if we integrate in the non-strict CSAF schema, we would be in touch with your team so there is opportunity to enrich vulnerability data and provide actionable feed to the operations. Thanks |
Some proposals for SARIF to offer harmonized/simplified/unified scales for metrics are:
The initial use cases are driven by learnings/needs from GitHub Advanced Security's code scanning feature. |
Updating this feature request with:
I'm not sure how to implement SSVC as "non-strict" CSAF but am exploring that option. Another hack would be to add a vulnerability note containg terse a SSVC vector string as the description. |
@sthagen, @santosomar: We should discuss this request in our next TC meeting. |
Absolutely! Consider it in the agenda. Great suggestions and conversation here! |
Thank you all One small update from earlier conversation - Vector Representation of SSVC is currently not quietly fully baked - CERTCC/SSVC#333 . But a full JSON representation now exists and hopefully will be part of projects like vulnrichment and VINCE. |
@sei-vsarvepalli Thank you for pointing that out. If the TC decides to include that (which I hope), I'll probably come back to you to clarify any open question. |
CSAF team,
The CSAF scores object
csaf/csaf_2.0/json_schema/csaf_json_schema.json
Line 1255 in 164cad8
We have a JSON schema, definition and examples of such scores available at CERT/CC's Github page https://github.com/CERTCC/SSVC. I would like to learn the best ways to represent such data in CSAF.
An example is shown here for convenience using an array for fields under the property called "metrics". Note: the SSVC decisions can have multiple values for a single vulnerability by CVE) or a group of vulnerabilities (say by CERT''s VU#). SSVC also have a timestamp field which can be used to update a vulnerability's computed prioritization.
Thanks
Vijay
The text was updated successfully, but these errors were encountered: