Skip to content

Commit 1987f53

Browse files
authored
Merge branch 'main' into 890-add-csv-generation-to-doctoolspy
2 parents 9313182 + 7501dc0 commit 1987f53

File tree

276 files changed

+2886
-3091
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

276 files changed

+2886
-3091
lines changed

data/json/decision_points/basic/do_schedule_delegate_delete_1_0_0.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,28 @@
33
"key": "IKE",
44
"version": "1.0.0",
55
"name": "Do, Schedule, Delegate, Delete",
6-
"description": "The Eisenhower outcome group.",
6+
"definition": "The Eisenhower outcome group.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "D",
1111
"name": "Delete",
12-
"description": "Delete"
12+
"definition": "Delete"
1313
},
1414
{
1515
"key": "G",
1616
"name": "Delegate",
17-
"description": "Delegate"
17+
"definition": "Delegate"
1818
},
1919
{
2020
"key": "S",
2121
"name": "Schedule",
22-
"description": "Schedule"
22+
"definition": "Schedule"
2323
},
2424
{
2525
"key": "O",
2626
"name": "Do",
27-
"description": "Do"
27+
"definition": "Do"
2828
}
2929
]
3030
}

data/json/decision_points/basic/lowmediumhigh_1_0_0.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,23 @@
33
"key": "LMH",
44
"version": "1.0.0",
55
"name": "LowMediumHigh",
6-
"description": "A Low/Medium/High decision point / outcome group.",
6+
"definition": "A Low/Medium/High decision point / outcome group.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "L",
1111
"name": "Low",
12-
"description": "Low"
12+
"definition": "Low"
1313
},
1414
{
1515
"key": "M",
1616
"name": "Medium",
17-
"description": "Medium"
17+
"definition": "Medium"
1818
},
1919
{
2020
"key": "H",
2121
"name": "High",
22-
"description": "High"
22+
"definition": "High"
2323
}
2424
]
2525
}

data/json/decision_points/basic/moscow_1_0_0.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,28 @@
33
"key": "MSCW",
44
"version": "1.0.0",
55
"name": "MoSCoW",
6-
"description": "The MoSCoW (Must, Should, Could, Won't) outcome group.",
6+
"definition": "The MoSCoW (Must, Should, Could, Won't) outcome group.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "W",
1111
"name": "Won't",
12-
"description": "Won't"
12+
"definition": "Won't"
1313
},
1414
{
1515
"key": "C",
1616
"name": "Could",
17-
"description": "Could"
17+
"definition": "Could"
1818
},
1919
{
2020
"key": "S",
2121
"name": "Should",
22-
"description": "Should"
22+
"definition": "Should"
2323
},
2424
{
2525
"key": "M",
2626
"name": "Must",
27-
"description": "Must"
27+
"definition": "Must"
2828
}
2929
]
3030
}

data/json/decision_points/basic/value_complexity_1_0_0.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,28 @@
33
"key": "VALUE_COMPLEXITY",
44
"version": "1.0.0",
55
"name": "Value, Complexity",
6-
"description": "The Value/Complexity outcome group.",
6+
"definition": "The Value/Complexity outcome group.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "D",
1111
"name": "Drop",
12-
"description": "Drop"
12+
"definition": "Drop"
1313
},
1414
{
1515
"key": "R",
1616
"name": "Reconsider Later",
17-
"description": "Reconsider Later"
17+
"definition": "Reconsider Later"
1818
},
1919
{
2020
"key": "E",
2121
"name": "Easy Win",
22-
"description": "Easy Win"
22+
"definition": "Easy Win"
2323
},
2424
{
2525
"key": "F",
2626
"name": "Do First",
27-
"description": "Do First"
27+
"definition": "Do First"
2828
}
2929
]
3030
}

data/json/decision_points/basic/yesno_1_0_0.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@
33
"key": "YN",
44
"version": "1.0.0",
55
"name": "YesNo",
6-
"description": "A Yes/No decision point / outcome group.",
6+
"definition": "A Yes/No decision point / outcome group.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "N",
1111
"name": "No",
12-
"description": "No"
12+
"definition": "No"
1313
},
1414
{
1515
"key": "Y",
1616
"name": "Yes",
17-
"description": "Yes"
17+
"definition": "Yes"
1818
}
1919
]
2020
}

data/json/decision_points/cisa/cisa_levels_1_1_0.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,28 @@
33
"key": "CISA",
44
"version": "1.1.0",
55
"name": "CISA Levels",
6-
"description": "The CISA outcome group. CISA uses its own SSVC decision tree model to prioritize relevant vulnerabilities into four possible decisions: Track, Track*, Attend, and Act.",
6+
"definition": "The CISA outcome group. CISA uses its own SSVC decision tree model to prioritize relevant vulnerabilities into four possible decisions: Track, Track*, Attend, and Act.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "T",
1111
"name": "Track",
12-
"description": "The vulnerability does not require action at this time. The organization would continue to track the vulnerability and reassess it if new information becomes available. CISA recommends remediating Track vulnerabilities within standard update timelines."
12+
"definition": "The vulnerability does not require action at this time. The organization would continue to track the vulnerability and reassess it if new information becomes available. CISA recommends remediating Track vulnerabilities within standard update timelines."
1313
},
1414
{
1515
"key": "T*",
1616
"name": "Track*",
17-
"description": "The vulnerability contains specific characteristics that may require closer monitoring for changes. CISA recommends remediating Track* vulnerabilities within standard update timelines."
17+
"definition": "The vulnerability contains specific characteristics that may require closer monitoring for changes. CISA recommends remediating Track* vulnerabilities within standard update timelines."
1818
},
1919
{
2020
"key": "AT",
2121
"name": "Attend",
22-
"description": "The vulnerability requires attention from the organization's internal, supervisory-level individuals. Necessary actions may include requesting assistance or information about the vulnerability and may involve publishing a notification, either internally and/or externally, about the vulnerability. CISA recommends remediating Attend vulnerabilities sooner than standard update timelines."
22+
"definition": "The vulnerability requires attention from the organization's internal, supervisory-level individuals. Necessary actions may include requesting assistance or information about the vulnerability and may involve publishing a notification, either internally and/or externally, about the vulnerability. CISA recommends remediating Attend vulnerabilities sooner than standard update timelines."
2323
},
2424
{
2525
"key": "AC",
2626
"name": "Act",
27-
"description": "The vulnerability requires attention from the organization's internal, supervisory-level and leadership-level individuals. Necessary actions include requesting assistance or information about the vulnerability, as well as publishing a notification either internally and/or externally. Typically, internal groups would meet to determine the overall response and then execute agreed upon actions. CISA recommends remediating Act vulnerabilities as soon as possible."
27+
"definition": "The vulnerability requires attention from the organization's internal, supervisory-level and leadership-level individuals. Necessary actions include requesting assistance or information about the vulnerability, as well as publishing a notification either internally and/or externally. Typically, internal groups would meet to determine the overall response and then execute agreed upon actions. CISA recommends remediating Act vulnerabilities as soon as possible."
2828
}
2929
]
3030
}

data/json/decision_points/cisa/in_kev_1_0_0.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@
33
"key": "KEV",
44
"version": "1.0.0",
55
"name": "In KEV",
6-
"description": "Denotes whether a vulnerability is in the CISA Known Exploited Vulnerabilities (KEV) list.",
6+
"definition": "Denotes whether a vulnerability is in the CISA Known Exploited Vulnerabilities (KEV) list.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "N",
1111
"name": "No",
12-
"description": "Vulnerability is not listed in KEV."
12+
"definition": "Vulnerability is not listed in KEV."
1313
},
1414
{
1515
"key": "Y",
1616
"name": "Yes",
17-
"description": "Vulnerability is listed in KEV."
17+
"definition": "Vulnerability is listed in KEV."
1818
}
1919
]
2020
}

data/json/decision_points/cisa/mission_prevalence_1_0_0.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,23 @@
33
"key": "MP",
44
"version": "1.0.0",
55
"name": "Mission Prevalence",
6-
"description": "Prevalence of the mission essential functions",
6+
"definition": "Prevalence of the mission essential functions",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "M",
1111
"name": "Minimal",
12-
"description": "Neither Support nor Essential apply. The vulnerable component may be used within the entities, but it is not used as a mission-essential component, nor does it provide impactful support to mission-essential functions."
12+
"definition": "Neither Support nor Essential apply. The vulnerable component may be used within the entities, but it is not used as a mission-essential component, nor does it provide impactful support to mission-essential functions."
1313
},
1414
{
1515
"key": "S",
1616
"name": "Support",
17-
"description": "The vulnerable component only supports MEFs for two or more entities."
17+
"definition": "The vulnerable component only supports MEFs for two or more entities."
1818
},
1919
{
2020
"key": "E",
2121
"name": "Essential",
22-
"description": "The vulnerable component directly provides capabilities that constitute at least one MEF for at least one entity; component failure may (but does not necessarily) lead to overall mission failure."
22+
"definition": "The vulnerable component directly provides capabilities that constitute at least one MEF for at least one entity; component failure may (but does not necessarily) lead to overall mission failure."
2323
}
2424
]
2525
}

data/json/decision_points/cvss/access_complexity_1_0_0.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@
33
"key": "AC",
44
"version": "1.0.0",
55
"name": "Access Complexity",
6-
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
6+
"definition": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "H",
1111
"name": "High",
12-
"description": "Specialized access conditions exist; for example: the system is exploitable during specific windows of time (a race condition), the system is exploitable under specific circumstances (nondefault configurations), or the system is exploitable with victim interaction (vulnerability exploitable only if user opens e-mail)"
12+
"definition": "Specialized access conditions exist; for example: the system is exploitable during specific windows of time (a race condition), the system is exploitable under specific circumstances (nondefault configurations), or the system is exploitable with victim interaction (vulnerability exploitable only if user opens e-mail)"
1313
},
1414
{
1515
"key": "L",
1616
"name": "Low",
17-
"description": "Specialized access conditions or extenuating circumstances do not exist; the system is always exploitable."
17+
"definition": "Specialized access conditions or extenuating circumstances do not exist; the system is always exploitable."
1818
}
1919
]
2020
}

data/json/decision_points/cvss/access_complexity_2_0_0.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,23 @@
33
"key": "AC",
44
"version": "2.0.0",
55
"name": "Access Complexity",
6-
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
6+
"definition": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
77
"schemaVersion": "2.0.0",
88
"values": [
99
{
1010
"key": "H",
1111
"name": "High",
12-
"description": "Specialized access conditions exist."
12+
"definition": "Specialized access conditions exist."
1313
},
1414
{
1515
"key": "M",
1616
"name": "Medium",
17-
"description": "The access conditions are somewhat specialized."
17+
"definition": "The access conditions are somewhat specialized."
1818
},
1919
{
2020
"key": "L",
2121
"name": "Low",
22-
"description": "Specialized access conditions or extenuating circumstances do not exist."
22+
"definition": "Specialized access conditions or extenuating circumstances do not exist."
2323
}
2424
]
2525
}

0 commit comments

Comments
 (0)