diff --git a/draft/ssvc.html b/draft/ssvc.html index 33131090..a3305ddf 100644 --- a/draft/ssvc.html +++ b/draft/ssvc.html @@ -7,180 +7,184 @@ - - - - + -
Compiled Mon Jul 17 17:07:19 UTC 2023
+ +2023-09-01T15:03:59-04:00
This document defines a testable Stakeholder-Specific Vulnerability @@ -590,12 +592,12 @@
2,none,slow,diffuse,laborious,partial,minor,defer
-Where “2” is the row number, none through minor are values for decision -points, and defer is a priority label or outcome. Different -stakeholders will have different decision points (and so different -options for values) and different outcomes, but this is the basic shape -of a CSV file to define SSVC stakeholder decisions.
+2,none,laborious,partial,significant,scheduled
+Where “2” is the row number, none through significant are values for +decision points, and scheduled is a priority label or outcome. +Different stakeholders will have different decision points (and so +different options for values) and different outcomes, but this is the +basic shape of a CSV file to define SSVC stakeholder decisions.
The tree visualization options are more diverse. We provide an example format, and codified it in src/SSVC_csv-to-latex.py. Why have we gone to this trouble when (for example) the R data.tree @@ -2710,14 +2712,15 @@
This decision point accounts for the state of the supplier's work on addressing the vulnerability.
Fix Ready—the supplier has provided a patch or +fix.
Cooperative—the supplier is actively generating a patch +or fix; they may or may not have provided a mitigation or work-around in +the mean time.
Uncooperative/Unresponsive—the supplier has not +responded, declined to generate a remediation, or no longer exists.
+Given a specific stakeholder decision and set of useful decision points, we are now in a position to combine them into a comprehensive set of decisions about the priority with which to act. The definition of @@ -2730,8 +2733,8 @@
This logical statement is captured in line 35 of the deployer
-.csv
file.
This example logical statement is captured in (line 35 of the
+deployer .csv
file)[https://github.com/CERTCC/SSVC/blob/main/data/csvs/deployer-options.csv#L35].
There are different formats for capturing these prioritization decisions depending on how and where they are going to be used. In this paper, we primarily represent a full set of guidance on how one @@ -2743,7 +2746,7 @@
The example supplier tree PDF shows the proposed +
The example supplier tree PDF shows the proposed prioritization decision tree for the supplier. Both supplier and deployer trees use the above decision point definitions. Each tree is a compact way of expressing assertions or hypotheses about the relative @@ -2764,19 +2767,19 @@
The example deployer tree PDF is depicted +
The example deployer tree PDF is depicted below.
@@ -2802,14 +2805,14 @@Suggested decision values for this decision are available in CSV and PDF formats.
+Suggested decision values for this decision are available in CSV and PDF formats.
@@ -2853,12 +2856,12 @@When doing the detailed risk management work of creating or modifying a tree, we recommend working from text files with one line or row for -each unique combination of decision values. For examples, see SSVC/data. An -important benefit, in our experience, is that it is easier to identify a -question by saying “I'm unsure about row 16” than anything else we have -thought of so far. Once the humans agree on the decision tree, it can be -converted to a JSON schema for easier machine-readable communication, -following the provided SSVC +each unique combination of decision values. For examples, see SSVC/data. +An important benefit, in our experience, is that it is easier to +identify a question by saying “I'm unsure about row 16” than anything +else we have thought of so far. Once the humans agree on the decision +tree, it can be converted to a JSON schema for easier machine-readable +communication, following the provided SSVC provision JSON schema.
Once the decision points are selected and the prioritization labels agreed upon, it is convenient to be able to visually compress the text @@ -2925,8 +2928,9 @@
Interpreting the results of a permutation importance computation on a tree involves nuance, but one rule we can state is this: any feature with a computed permutation importance of zero can be eliminated from @@ -3073,7 +3077,7 @@
Because tree customization changes the tree structure and implies the @@ -3148,9 +3152,8 @@
Vulnerability management is a part of asset management. SSVC can @@ -3306,10 +3309,9 @@
Based on this, an example string could be:
-SSVCv2/Ps:Nm/T:T/U:E/2018-11-13T20:20:00Z/
-For a vulnerability with no or -minor Public Safety -Impact, total Technical Impact, and efficient Utility, +
SSVCv2/Ps:M/T:T/U:E/2018-11-13T20:20:00Z/
+For a vulnerability with minimal +Public Safety Impact, total Technical Impact, and efficient Utility, which was evaluated on Nov 13,2018 at 8:20 PM UTC.
While these abbreviated format vectors can be uniquely produced based on a properly formatted JSON object, going from abbreviated form to JSON @@ -3317,9 +3319,9 @@
For a more robust, self-contained, machine-readable, we provide JSON -schemas. The provision +schemas. The provision schema is equivalent to a decision tree and documents the full set -of logical statements that a stakeholder uses to make decisions. The computed +of logical statements that a stakeholder uses to make decisions. The computed schema expresses a set of information about a work item or vulnerability at a point in time. A computed schema should identify the provision schema used, so the options from which the information was @@ -3367,7 +3369,7 @@
The merit in this “list all values” approach emerges when the
stakeholder knows that the value for a decision point may be A or B, but
-not C. For example, say the analyst knows that Value Density is diffuse but does not know the value for *Automatability. Then the analyst can
+not C. For example, say the analyst knows that Value Density is diffuse but does not know the value for Automatability. Then the analyst can
usefully restrict Utility to one of laborious or efficient. In
abbreviated form, write this as U:LE
. As discussed below,
information can change over time. Partial information may be, but is not
@@ -3413,8 +3415,7 @@
The authors would first like to acknowledge the valuable +contributions of previous authors who have worked on earlier versions of +this report: Art Manion, Madison Oliver, and Deana Shick.
The authors thank the contributors to the SSVC project on Github as well as the following individuals for helpful comments on prior drafts (listed in alphabetical order): Muhammad Akbar, Will -Dormann, Manish Gaur, Ralph Langer, David Oxley Dale Peterson, Deana -Shick, Jeroen van der Ham, Michel van Eeten, and Sounil Yu. The authors -also thank those others too numerous to name individually who provided -comments and feedback, including: Attendees at S4, Miami FL 2020; -Attendees at A Conference on Defense (ACoD), Austin TX 2020; Anonymous -WEIS reviewers; Various staff members and analysts at CERT/CC, CISA, -McAfee, and VMWare; FIRST CVSS SIG and EPSS SIG members; and others who -wish to remain anonymous.
+Dormann, Manish Gaur, Ralph Langer, David Oxley Dale Peterson, Jeroen +van der Ham, Michel van Eeten, and Sounil Yu. +The authors also thank those others too numerous to name individually +who provided comments and feedback, including: Attendees at S4, Miami FL +2020; Attendees at A Conference on Defense (ACoD), Austin TX 2020; +Anonymous WEIS reviewers; Various staff members and analysts at CERT/CC, +CISA, McAfee, and VMWare; FIRST CVSS SIG and EPSS SIG members; and +others who wish to remain anonymous.
Software Engineering Institute
4500 Fifth Avenue, Pittsburgh, PA 15213-2612
DM19-1222
-