Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How vulnerability coordinators use CSAF? #37

Open
Tracked by #30
santosomar opened this issue Sep 30, 2022 · 2 comments
Open
Tracked by #30

How vulnerability coordinators use CSAF? #37

santosomar opened this issue Sep 30, 2022 · 2 comments

Comments

@santosomar
Copy link
Contributor

No description provided.

@santosomar santosomar changed the title How vulnerability coordinators use CSAF (Vijay, if interested, I can work with you on these. How vulnerability coordinators use CSAF? Sep 30, 2022
@santosomar
Copy link
Contributor Author

Create short videos (~ 2 minutes long) explaining the content described in the title of this issue. This issue is tracked in the parent issue #30

@sei-vsarvepalli
Copy link

CERT/CC is using CSAF currently as a rich Vulnerability format for representing all the information in our Vulnerability Notice https://kb.cert.org/vuls/ in a machine readable format. Each Vulnerability Note is available both before public release (via Private authenticated API) and after public release (via Public API) in CSAF format. More information available from Vul Note Public API and Vul Note Private API

We are also exploring some use cases as well with our Vultron protocol and potential use of CSAF for a more thorough analysis of CVD process - see Vultron Blog for more details of the proposed protocol. This long term plan for CSAF includes several activities like normalizing collection of vulnerability information from security researchers, gathering product status from vendors and finally collection of all metadata related to a vulnerability from external stakeholders (blogs, patches/workarounds, scores CVSS/SSVC, GitHub SA GHSA, exploits and threats) in order to manage the lifecycle of a vulnerability or a set of related vulnerabilities.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants