Look at Vulnerability Sample and Suggestions #684
Replies: 8 comments 1 reply
-
Notes from Findings weekly call - For the new Vulnerability Findings class - #Is a "Finding" necessary for vulnerability? Is this extra level of metadata necessary? - Yes #Should "title" in Security Finding Class be the name of the vulnerability? - Yes - add title in the base #I think this requirement for uid at Security Finding class should be removed ? - finding.uid change to recommended (Jason - not all products produce a uid for vuln) #CVE object needs Title, Criteria, and Remediation - Yes - change - remove/keep finding.remediation?, add vuln.cve.remediation #Should we have a simpler to implement field for "affected products" that would allow an array of product names? #We have these time values in CVE object, do we need them in "findings"? #Does Vulnerability Type make sense for this data? This seems more related to attacks/malware. #How would you map multiple CVSS score versions? Can I have an array of cvss score objects? #CVE Object needs supporting links array field, like: "https://nvd.nist.gov/vuln/detail/CVE-2023-34417","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34417" #Do we need severity at the vulnerability object level as well as CVSS Score object? #KB Articles might need its own Object. There's lots of interesting fields per KB. Such as OS, Release Dates, Bulletins, Title, CVE's, files, size, supporting links, etc. **This would also allow independent mapping of OS patching data. #I'm not sure about Recommended for related_vulnerabilites. #Add Host Profile #This Resources Details should be replaced by the Host profile include Device. #How does start_time differ from time? #Does "state" make sense for a vulnerability? Pending - |
Beta Was this translation helpful? Give feedback.
-
Based upon feedback and notes from prior call I have boiled these down further. I dropped anything that should stay as-is. A couple of these items may need additional discussion which I have noted. Please comment if I have missed anything.
|
Beta Was this translation helpful? Give feedback.
-
I started to tackle some discussed changes to Vulnerability, CVE, and CVSS Objects. Quick notes on changes:
My Next Steps:
|
Beta Was this translation helpful? Give feedback.
-
Leaving comments per individual bullet point -
|
Beta Was this translation helpful? Give feedback.
-
I've mocked up a new kb_articles object for attributes that describe the kb article from the OS vendor. These are attributes that describe the actual "patch" itself. New dictionary items: article, bulletin, superceeded, kbarticle_classification
|
Beta Was this translation helpful? Give feedback.
-
Assuming, these are placeholder descriptions.
|
Beta Was this translation helpful? Give feedback.
-
Regarding change to Product object we discussed for Common Platform Enumeration. I think we should keep it simple and under the Product object create a new attribute "cpe". Data value Examples: |
Beta Was this translation helpful? Give feedback.
-
Leaving some notes of what we discussed in the weekly Findings call - @floydtree to add timestamp fields to the vulnerability object and publish the PR for the new vuln class @jasonbreimer to create a new
|
Beta Was this translation helpful? Give feedback.
-
I wanted to start a conversation based upon sample vulnerability data from my organization. I attempted to rough map example data using the existing Security Findings structure. I did not include all fields but stuck closer to key/values my organization might produce. To make this more readable I included comments within the sample and then also copied them below separately. This does not include the addition of Host Profile > Device object though I strongly suggest we allow that in the future.
Sample Data:
Questions/Comments/Recommendations
#Is a "Finding" necessary for vulnerability? Is this extra level of metadata necessary?
#Should "title" in Security Finding Class be the name of the vulnerability?
#I think this requirement for uid at Security Finding class should be removed.
#CVE object needs Title, Criteria, and Remediation
#Should we have a simpler to implement field for "affected products" that would allow an array of product names?
#Some of these recommended fields like language in Product object don't always make sense for vulnerability.
#We have these time values in CVE object, do we need them in "findings"?
#Along with affected "product" we need a way to include affected OS/platform information.
#Does Vulnerability Type make sense for this data? This seems more related to attacks/malware.
#How would you map multiple CVSS score versions? Can I have an array of cvss score objects?
#I see references to CVSS v2.0 and v3.0 in schema. Should we include v1.0?
#CVE Object needs supporting links array field, like: "https://nvd.nist.gov/vuln/detail/CVE-2023-34417","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34417"
#Do we need severity at the vulnerability object level as well as CVSS Score object?
#KB Articles might need its own Object. There's lots of interesting fields per KB. Such as OS, Release Dates, Bulletins, Title, CVE's, files, size, supporting links, etc. **This would also allow independent mapping of OS patching data.
#Maybe References should be moved into CVE Object?
#I'm not sure about Recommended for related_vulnerabilites.
#Add Host Profile
#This Resources Details should be replaced by the Host profile include Device.
#Do we need another severity at Security Finding Class?
#How does start_time differ from time?
#Does "state" make sense for a vulnerability?
Beta Was this translation helpful? Give feedback.
All reactions