diff --git a/mappings/cvss_v3/cvss_v3.json b/mappings/cvss_v3/cvss_v3.json index 492dfb3..7bec7a1 100644 --- a/mappings/cvss_v3/cvss_v3.json +++ b/mappings/cvss_v3/cvss_v3.json @@ -3,6 +3,72 @@ "default": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" }, "content": [ + { + "id": "cloud_security", + "children": [ + { + "id": "identity_and_access_management_iam_misconfigurations", + "children": [ + { + "id": "overly_permissive_iam_roles", + "cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + }, + { + "id": "publicly_accessible_iam_credentials", + "cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ] + }, + { + "id": "storage_misconfigurations", + "children": [ + { + "id": "publicly_accessible_cloud_storage", + "cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "id": "unencrypted_sensitive_data_at_rest", + "cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ] + }, + { + "id": "network_configuration_issues", + "children": [ + { + "id": "open_management_ports_to_the_internet", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "id": "lack_of_network_segmentation", + "cvss_v3": "AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" + } + ] + }, + { + "id": "misconfigured_services_and_apis", + "children": [ + { + "id": "exposed_debug_or_admin_interfaces", + "cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + }, + { + "id": "insecure_api_endpoints", + "cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ] + }, + { + "id": "logging_and_monitoring_issues", + "children": [ + { + "id": "disabled_or_insufficient_logging", + "cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" + } + ] + } + ] + }, { "id": "ai_application_security", "children": [ diff --git a/mappings/remediation_advice/remediation_advice.json b/mappings/remediation_advice/remediation_advice.json index 24ba0d5..c646e71 100644 --- a/mappings/remediation_advice/remediation_advice.json +++ b/mappings/remediation_advice/remediation_advice.json @@ -14,6 +14,14 @@ "https://owasp.org/www-project-top-10-for-large-language-model-applications/" ] }, + { + "id": "cloud_security", + "remediation_advice": "Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.", + "references": [ + "https://owasp.org/www-project-cloud-native-application-security-top-10/", + "https://cloudsecurityalliance.org/artifacts/security-guidance-v4/" + ] + }, { "id": "algorithmic_biases", "children": [ diff --git a/vulnerability-rating-taxonomy.json b/vulnerability-rating-taxonomy.json index 745067d..025537e 100644 --- a/vulnerability-rating-taxonomy.json +++ b/vulnerability-rating-taxonomy.json @@ -3,6 +3,101 @@ "release_date": "2025-06-23T00:00:00+00:00" }, "content": [ + { + "id": "cloud_security", + "name": "Cloud Security", + "type": "category", + "children": [ + { + "id": "identity_and_access_management_iam_misconfigurations", + "name": "Identity and Access Management (IAM) Misconfigurations", + "type": "subcategory", + "children": [ + { + "id": "overly_permissive_iam_roles", + "name": "Overly Permissive IAM Roles", + "type": "variant", + "priority": 2 + }, + { + "id": "publicly_accessible_iam_credentials", + "name": "Publicly Accessible IAM Credentials", + "type": "variant", + "priority": 1 + } + ] + }, + { + "id": "storage_misconfigurations", + "name": "Storage Misconfigurations", + "type": "subcategory", + "children": [{ + "id": "publicly_accessible_cloud_storage", + "name": "Publicly Accessible Cloud Storage", + "type": "variant", + "priority": null + }, + { + "id": "unencrypted_sensitive_data_at_rest", + "name": "Unencrypted Sensitive Data at Rest", + "type": "variant", + "priority": 2 + } + ] + }, + { + "id": "network_configuration_issues", + "name": "Network Configuration Issues", + "type": "subcategory", + "children": [ + { + "id": "open_management_ports_to_the_internet", + "name": "Open Management Ports to the Internet", + "type": "variant", + "priority": 3 + }, + { + "id": "lack_of_network_segmentation", + "name": "Lack of Network Segmentation", + "type": "variant", + "priority": 3 + } + ] + }, + { + "id": "misconfigured_services_and_apis", + "name": "Misconfigured Services and APIs", + "type": "subcategory", + "children": [ + { + "id": "exposed_debug_or_admin_interfaces", + "name": "Exposed Debug or Admin Interfaces", + "type": "variant", + "priority": null + }, + { + "id": "insecure_api_endpoints", + "name": "Insecure API Endpoints", + "type": "variant", + "priority": 4 + } + ] + }, + { + "id": "logging_and_monitoring_issues", + "name": "Logging and Monitoring Issues", + "type": "subcategory", + "children": [ + { + "id": "disabled_or_insufficient_logging", + "name": "Disabled or Insufficient Logging", + "type": "variant", + "priority": 5 + } + ] + } + ] + }, { "id": "ai_application_security", "name": "AI Application Security",