Skip to content

Commit 4ae9b62

Browse files
author
Renae Metcalf
committed
Add links from Reference/DP pages to Howto/GI pages. Add versioning to Howto/GI pages.
1 parent ce4d811 commit 4ae9b62

File tree

12 files changed

+65
-0
lines changed

12 files changed

+65
-0
lines changed

docs/howto/gathering_info/automatable.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Gathering Information about Automatable
22

3+
``` python exec="true" idprefix=""
4+
from ssvc.decision_points.ssvc.automatable import LATEST
5+
from ssvc.doc_helpers import example_block
6+
7+
print(example_block(LATEST))
8+
```
9+
310
An analyst should be able to sketch the automation scenario and how it either does or does not satisfy each of the four kill chain steps.
411
Once one step is not satisfied, the analyst can stop and select [*no*](automatable.md).
512
Code that demonstrably automates all four kill chain steps certainly satisfies as a sketch.

docs/howto/gathering_info/exploitation.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,10 @@
11
# Gathering Information About Exploitation
2+
```python exec="true" idprefix=""
3+
from ssvc.decision_points.ssvc.automatable import LATEST
4+
from ssvc.doc_helpers import example_block
5+
6+
print(example_block(LATEST))
7+
```
28

39
[@householder2020historical] presents a method for searching the GitHub repositories of open-source exploit databases.
410
This method could be employed to gather information about whether *PoC* is true.

docs/howto/gathering_info/mission_impact.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Gathering Information About Mission Impact
22

3+
```python exec="true" idprefix=""
4+
from ssvc.decision_points.ssvc.automatable import LATEST
5+
from ssvc.doc_helpers import example_block
6+
7+
print(example_block(LATEST))
8+
```
9+
310
The factors that influence the mission impact level are diverse.
411
The material here does not exhaustively discuss how a stakeholder should answer a question; that is a topic for future work.
512
At a minimum, understanding mission impact should include gathering information about the critical paths that involve vulnerable components, viability of contingency measures, and resiliency of the systems that support the mission.

docs/howto/gathering_info/system_exposure.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Gathering Information About System Exposure
22

3+
```python exec="true" idprefix=""
4+
from ssvc.decision_points.ssvc.automatable import LATEST
5+
from ssvc.doc_helpers import example_block
6+
7+
print(example_block(LATEST))
8+
```
9+
310
*System Exposure* is primarily used by Deployers, so the question is about whether some specific system is in fact exposed, not a hypothetical or aggregate question about systems of that type.
411
Therefore, it generally has a concrete answer, even though it may vary from vulnerable component to vulnerable component, based on their respective configurations.
512

docs/howto/gathering_info/technical_impact.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Gathering Information About Technical Impact
22

3+
```python exec="true" idprefix=""
4+
from ssvc.decision_points.ssvc.automatable import LATEST
5+
from ssvc.doc_helpers import example_block
6+
7+
print(example_block(LATEST))
8+
```
9+
310
Assessing *Technical Impact* amounts to assessing the degree of control over the vulnerable component the attacker stands to gain by exploiting the vulnerability.
411
One way to approach this analysis is to ask whether the control gained is *total* or not.
512
If it is not total, it is *partial*.

docs/howto/gathering_info/value_density.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Gathering Information About Value Density
22

3+
```python exec="true" idprefix=""
4+
from ssvc.decision_points.ssvc.automatable import LATEST
5+
from ssvc.doc_helpers import example_block
6+
7+
print(example_block(LATEST))
8+
```
9+
310
The heuristics presented in the *Value Density* definitions involve whether the system is usually maintained by a dedicated professional, although we have noted some exceptions (such as encrypted mobile messaging applications).
411
If there are additional counterexamples to this heuristic, please describe them and the reasoning why the system should have the alternative decision value in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
512

docs/reference/decision_points/automatable.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ from ssvc.doc_helpers import example_block
77
print(example_block(LATEST))
88
```
99

10+
!!! tip "Gathering Information about Automatable"
11+
12+
See this [HowTo](../../howto/gathering_info/automatable.md) for advice on gathering information about the Automatable decision point.
13+
1014
!!! tip "See also"
1115

1216
Automatable combines with [Value Density](./value_density.md) to inform

docs/reference/decision_points/exploitation.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ from ssvc.doc_helpers import example_block
77
print(example_block(LATEST))
88
```
99

10+
!!! tip "Gathering Information about Exploitation"
11+
12+
See this [HowTo](../../howto/gathering_info/exploitation.md) for advice on gathering information about the Exploitation decision point.
13+
1014
The intent of this measure is the present state of exploitation of the vulnerability. The intent is not to predict future exploitation but only to acknowledge the current state of affairs. Predictive systems, such as EPSS, could be used to augment this decision or to notify stakeholders of likely changes [@jacobs2021epss].
1115

1216
## CWE-IDs for *PoC*

docs/reference/decision_points/mission_impact.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ from ssvc.doc_helpers import example_block
77
print(example_block(LATEST))
88
```
99

10+
!!! tip "Gathering Information about Mission Impact"
11+
12+
See this [HowTo](../../howto/gathering_info/mission_impact.md) for advice on gathering information about the Mission Impact decision point.
13+
1014
!!! tip "See also"
1115

1216
Mission Impact combines with [Safety Impact](./safety_impact.md) to inform

docs/reference/decision_points/system_exposure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ from ssvc.doc_helpers import example_block
77
print(example_block(LATEST))
88
```
99

10+
!!! tip "Gathering Information about System Exposure"
11+
12+
See this [HowTo](../../howto/gathering_info/system_exposure.md) for advice on gathering information about the System Exposure decision point.
13+
1014
Measuring the attack surface precisely is difficult, and we do not propose to perfectly delineate between small and controlled access.
1115
Exposure should be judged against the system in its deployed context, which may differ from how it is commonly expected to be deployed.
1216
For example, the exposure of a device on a vehicle's CAN bus will vary depending on the presence of a cellular telemetry device on the same bus.

0 commit comments

Comments
 (0)