-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[VulnWhisperer] Create Vulnerability standard for all scanner modules #113
Comments
Implementation started at #177. |
To keep track, my understanding is
Currently
|
@pemontto that is indeed how it should be, thanks for the confirmation! |
Would a risk_source be valuable? or is it something that already exists as a field The thought behind it it if you are using both Nessus and Qualys and want to see the source of the risk value or the risk_number value because both use their own reasoning for the risk. For when you have both scanners scanning the same endpoint finding the same vulnerability but each setting a different risk value. |
@elvarb yes, in beta-2.0 we export a
|
The vulnerability index of ECS was released on December 2019 with version 1.3, so we will be working on using it as the official Vulnerability Standard on which VulnWhisperer relies. We will be working on the mapping as soon as we get resources to continue with the whole refactoring. |
Create a VulnWhisperer Vulnerability Standard template for all scanner results to follow when being stored locally. This will unify all the differences from the scanners into a single structure, which will make VulnWhisperer easier to integrate with new modules and less prone to errors and failures.
This change will mean:
Also, ideally the new standard Logstash config would follow ECS already (#97).
Resources:
elastic/ecs#113
https://github.com/DefectDojo/sample-scan-files
https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format.html#securityhub-findings-format-syntax
The text was updated successfully, but these errors were encountered: