Skip to content

Commit ea89ddb

Browse files
committed
Updates
1 parent 2caccfb commit ea89ddb

File tree

2 files changed

+74
-0
lines changed

2 files changed

+74
-0
lines changed

mappings/cvss_v3/cvss_v3.json

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,72 @@
33
"default": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
44
},
55
"content": [
6+
{
7+
"id": "cloud_security",
8+
"children": [
9+
{
10+
"id": "identity_and_access_management_iam_misconfigurations",
11+
"children": [
12+
{
13+
"id": "overly_permissive_iam_roles",
14+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
},
16+
{
17+
"id": "publicly_accessible_iam_credentials",
18+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
19+
}
20+
]
21+
},
22+
{
23+
"id": "storage_misconfigurations",
24+
"children": [
25+
{
26+
"id": "publicly_accessible_cloud_storage",
27+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
28+
},
29+
{
30+
"id": "unencrypted_sensitive_data_at_rest",
31+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
32+
}
33+
]
34+
},
35+
{
36+
"id": "network_configuration_issues",
37+
"children": [
38+
{
39+
"id": "open_management_ports_to_the_internet",
40+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
41+
},
42+
{
43+
"id": "lack_of_network_segmentation",
44+
"cvss_v3": "AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"
45+
}
46+
]
47+
},
48+
{
49+
"id": "misconfigured_services_and_apis",
50+
"children": [
51+
{
52+
"id": "exposed_debug_or_admin_interfaces",
53+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
54+
},
55+
{
56+
"id": "insecure_api_endpoints",
57+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
58+
}
59+
]
60+
},
61+
{
62+
"id": "logging_and_monitoring_issues",
63+
"children": [
64+
{
65+
"id": "disabled_or_insufficient_logging",
66+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
67+
}
68+
]
69+
}
70+
]
71+
},
672
{
773
"id": "ai_application_security",
874
"children": [

mappings/remediation_advice/remediation_advice.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,14 @@
1414
"https://owasp.org/www-project-top-10-for-large-language-model-applications/"
1515
]
1616
},
17+
{
18+
"id": "cloud_security",
19+
"remediation_advice": "Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.",
20+
"references": [
21+
"https://owasp.org/www-project-cloud-native-application-security-top-10/",
22+
"https://cloudsecurityalliance.org/artifacts/security-guidance-v4/"
23+
]
24+
},
1725
{
1826
"id": "algorithmic_biases",
1927
"children": [

0 commit comments

Comments
 (0)