Look at Vulnerability Sample and Suggestions #684
Replies: 9 comments 1 reply
-
Notes from Findings weekly call - For the new Vulnerability Findings class - #Is a "Finding" necessary for vulnerability? Is this extra level of metadata necessary? - Yes #Should "title" in Security Finding Class be the name of the vulnerability? - Yes - add title in the base #I think this requirement for uid at Security Finding class should be removed ? - finding.uid change to recommended (Jason - not all products produce a uid for vuln) #CVE object needs Title, Criteria, and Remediation - Yes - change - remove/keep finding.remediation?, add vuln.cve.remediation #Should we have a simpler to implement field for "affected products" that would allow an array of product names? #We have these time values in CVE object, do we need them in "findings"? #Does Vulnerability Type make sense for this data? This seems more related to attacks/malware. #How would you map multiple CVSS score versions? Can I have an array of cvss score objects? #CVE Object needs supporting links array field, like: "https://nvd.nist.gov/vuln/detail/CVE-2023-34417","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34417" #Do we need severity at the vulnerability object level as well as CVSS Score object? #KB Articles might need its own Object. There's lots of interesting fields per KB. Such as OS, Release Dates, Bulletins, Title, CVE's, files, size, supporting links, etc. **This would also allow independent mapping of OS patching data. #I'm not sure about Recommended for related_vulnerabilites. #Add Host Profile #This Resources Details should be replaced by the Host profile include Device. #How does start_time differ from time? #Does "state" make sense for a vulnerability? Pending - |
Beta Was this translation helpful? Give feedback.
-
Based upon feedback and notes from prior call I have boiled these down further. I dropped anything that should stay as-is. A couple of these items may need additional discussion which I have noted. Please comment if I have missed anything.
|
Beta Was this translation helpful? Give feedback.
-
I started to tackle some discussed changes to Vulnerability, CVE, and CVSS Objects. Quick notes on changes:
My Next Steps:
|
Beta Was this translation helpful? Give feedback.
-
Leaving comments per individual bullet point -
|
Beta Was this translation helpful? Give feedback.
-
I've mocked up a new kb_articles object for attributes that describe the kb article from the OS vendor. These are attributes that describe the actual "patch" itself. New dictionary items: article, bulletin, superceeded, kbarticle_classification
|
Beta Was this translation helpful? Give feedback.
-
Assuming, these are placeholder descriptions.
|
Beta Was this translation helpful? Give feedback.
-
Regarding change to Product object we discussed for Common Platform Enumeration. I think we should keep it simple and under the Product object create a new attribute "cpe". Data value Examples: |
Beta Was this translation helpful? Give feedback.
-
Leaving some notes of what we discussed in the weekly Findings call - @floydtree to add timestamp fields to the vulnerability object and publish the PR for the new vuln class @jasonbreimer to create a new
|
Beta Was this translation helpful? Give feedback.
-
Closing discussion as this work is complete in 1.5. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I wanted to start a conversation based upon sample vulnerability data from my organization. I attempted to rough map example data using the existing Security Findings structure. I did not include all fields but stuck closer to key/values my organization might produce. To make this more readable I included comments within the sample and then also copied them below separately. This does not include the addition of Host Profile > Device object though I strongly suggest we allow that in the future.
Sample Data:
Questions/Comments/Recommendations
#Is a "Finding" necessary for vulnerability? Is this extra level of metadata necessary?
#Should "title" in Security Finding Class be the name of the vulnerability?
#I think this requirement for uid at Security Finding class should be removed.
#CVE object needs Title, Criteria, and Remediation
#Should we have a simpler to implement field for "affected products" that would allow an array of product names?
#Some of these recommended fields like language in Product object don't always make sense for vulnerability.
#We have these time values in CVE object, do we need them in "findings"?
#Along with affected "product" we need a way to include affected OS/platform information.
#Does Vulnerability Type make sense for this data? This seems more related to attacks/malware.
#How would you map multiple CVSS score versions? Can I have an array of cvss score objects?
#I see references to CVSS v2.0 and v3.0 in schema. Should we include v1.0?
#CVE Object needs supporting links array field, like: "https://nvd.nist.gov/vuln/detail/CVE-2023-34417","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34417"
#Do we need severity at the vulnerability object level as well as CVSS Score object?
#KB Articles might need its own Object. There's lots of interesting fields per KB. Such as OS, Release Dates, Bulletins, Title, CVE's, files, size, supporting links, etc. **This would also allow independent mapping of OS patching data.
#Maybe References should be moved into CVE Object?
#I'm not sure about Recommended for related_vulnerabilites.
#Add Host Profile
#This Resources Details should be replaced by the Host profile include Device.
#Do we need another severity at Security Finding Class?
#How does start_time differ from time?
#Does "state" make sense for a vulnerability?
Beta Was this translation helpful? Give feedback.
All reactions