|
2 | 2 | """ |
3 | 3 | Provides the NCISS Observed Activity Decision Point. |
4 | 4 | """ |
5 | | -# Copyright (c) 2025 Carnegie Mellon University and Contributors. |
6 | | -# - see Contributors.md for a full list of Contributors |
7 | | -# - see ContributionInstructions.md for information on how you can Contribute to this project |
8 | | -# Stakeholder Specific Vulnerability Categorization (SSVC) is |
9 | | -# licensed under a MIT (SEI)-style license, please see LICENSE.md distributed |
10 | | -# with this Software or contact permission@sei.cmu.edu for full terms. |
11 | | -# Created, in part, with funding and support from the United States Government |
12 | | -# (see Acknowledgments file). This program may include and/or can make use of |
13 | | -# certain third party source code, object code, documentation and other files |
14 | | -# (“Third Party Software”). See LICENSE.md for more details. |
15 | | -# Carnegie Mellon®, CERT® and CERT Coordination Center® are registered in the |
16 | | -# U.S. Patent and Trademark Office by Carnegie Mellon University |
| 5 | +# Copyright (c) 2025 Carnegie Mellon University. |
| 6 | +# NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE |
| 7 | +# ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. |
| 8 | +# CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, |
| 9 | +# EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT |
| 10 | +# NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR |
| 11 | +# MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE |
| 12 | +# OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE |
| 13 | +# ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM |
| 14 | +# PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. |
| 15 | +# Licensed under a MIT (SEI)-style license, please see LICENSE or contact |
| 16 | +# permission@sei.cmu.edu for full terms. |
| 17 | +# [DISTRIBUTION STATEMENT A] This material has been approved for |
| 18 | +# public release and unlimited distribution. Please see Copyright notice |
| 19 | +# for non-US Government use and distribution. |
| 20 | +# This Software includes and/or makes use of Third-Party Software each |
| 21 | +# subject to its own license. |
| 22 | +# DM24-0278 |
17 | 23 |
|
18 | 24 | from ssvc.decision_points.base import SsvcDecisionPointValue |
19 | 25 | from ssvc.decision_points.helpers import print_versions_and_diffs |
|
23 | 29 | key="P", |
24 | 30 | name="Prepare", |
25 | 31 | description="Prepare actions are actions taken to establish objectives, intent, and strategy; " |
26 | | - "identify potential targets and attack vectors; " |
27 | | - "identify resource requirements; " |
28 | | - "and develop capabilities.", |
| 32 | + "identify potential targets and attack vectors; " |
| 33 | + "identify resource requirements; " |
| 34 | + "and develop capabilities.", |
29 | 35 | ) |
30 | 36 |
|
31 | 37 | ENGAGE = SsvcDecisionPointValue( |
32 | 38 | key="E", |
33 | 39 | name="Engage", |
34 | 40 | description="Engage activities are actions taken against a specific target or target set prior to gaining, " |
35 | | - "but with the intent to gain access to the victim's physical or virtual computer or information systems, " |
36 | | - "networks, and data stores.", |
| 41 | + "but with the intent to gain access to the victim's physical or virtual computer or information systems, " |
| 42 | + "networks, and data stores.", |
37 | 43 | ) |
38 | 44 |
|
39 | 45 | PRESENCE = SsvcDecisionPointValue( |
40 | 46 | key="R", |
41 | 47 | name="Presence", |
42 | | - description="Presence is the set of actions taken by the threat actor once access to the target physical or " |
43 | | - "virtual computer or information system has been achieved. " |
44 | | - "These actions establish and maintain conditions for the threat actor to perform intended actions " |
45 | | - "or operate at will against the host physical or virtual computer or information system, network, " |
46 | | - "or data stores.", |
| 48 | + description="Presence is the set of actions taken by the threat actor once access to the target physical or " |
| 49 | + "virtual computer or information system has been achieved. " |
| 50 | + "These actions establish and maintain conditions for the threat actor to perform intended actions " |
| 51 | + "or operate at will against the host physical or virtual computer or information system, network, " |
| 52 | + "or data stores.", |
47 | 53 | ) |
48 | 54 |
|
49 | 55 | EFFECT = SsvcDecisionPointValue( |
50 | 56 | key="F", |
51 | 57 | name="Effect", |
52 | 58 | description="Effects are outcomes of a threat actor’s actions " |
53 | | - "on a victim’s physical or virtual computer or information systems, networks, and data stores.", |
| 59 | + "on a victim’s physical or virtual computer or information systems, networks, and data stores.", |
54 | 60 | ) |
55 | 61 |
|
56 | 62 |
|
|
64 | 70 | VERSIONS = (OBSERVED_ACTIVITY,) |
65 | 71 | LATEST = VERSIONS[-1] |
66 | 72 |
|
| 73 | + |
67 | 74 | def main(): |
68 | 75 | print_versions_and_diffs(VERSIONS) |
69 | 76 |
|
70 | 77 |
|
71 | | -if __name__ == '__main__': |
| 78 | +if __name__ == "__main__": |
72 | 79 | main() |
0 commit comments