AI智能总结
Vulnerability Data工作组固定且正式的地点是https://cloudsecurityalliance.org/research/working-groups/vulnerability-data © 2024 云安全联盟——版权所有。您可以下载、存储、在您的计算机上显示、查看、打印,并链接至云安全联盟。https://cloudsecurityalliance.org受以下条款约束:(a) 草稿仅供个人、信息、非商业用途使用;(b) 草稿不得以任何方式修改或变更;(c) 草稿不得重新分发;(d) 商标、版权或其他声明不得删除。根据美国版权法中合理使用条款的规定,您可以引用草稿的部分内容,但须将所引用部分归因于云安全联盟。 致谢 主要作者 Abhineeth Pasam Ahaan Sinha 审稿人 Alan Curran MSc Anita Whitby Charan Akiri Clifton FernandesDebrup Ghosh Edward Newman Gene Schank James Morgan-Jones Mallika Gunturu Mark SzalkiewiczMeghana Parwate Michael Roza PrateekMittal Rahul Kalva Rajashekar Yasani Rhitvik Sinha Shruti Dhumak Sudheer Vallandas Vani Murthy CSA Global Staff Josh Buker StephenLumpe Kurt Seifried 目录 致谢........................................................................................................................................................3目录.........................................................................................................................................................4引言...................................................................................................................................................................5脆弱性数据的作用............................................................................................................................................5当前漏洞数据状态....................................................................................................................6识别当前面临的挑战...........................................................................................................................6CVE.........................................................................................................................................................................6数据质量和保真度..............................................................................................................................6不良激励不创建CVEs....................................................................................................7寻找相关漏洞数据............................................................................................................7通知项目维护者......................................................................................................................8缺乏互操作性.................................................................................................................................8解决纠纷........................................................................................................................................9报告漏洞的复杂性.....................................................................................................9每年CVE数量不断增加....................................................................................................10CVSS.......................................................................................................................................................................11CVSS的缺点......................................................................................................................................12无法优先考虑风险............................................................................................................................................12静态评分系统..................................................................................................................................13用户故事................................................................................................................................................................. 13cURL......................................................................................................................................................................13定制解决方案................................................................................................................................................14替代CVSS的方法..................................................................................................................................................15威胁建模框架...................................................................................................................................... 18什么是威胁建模?...................................................................................................................................18STRIDE..................................................................................................................................................................18LINDDUN..............................................................................................................................................................19PASTA....................................................................................................................................................................19VAST.....................................................................................................................................................................20TRIKE....................