Skip to content

Commit cec42f3

Browse files
TimmyBugcrowdabhinav-nain
authored andcommitted
Updates
1 parent 67e2cff commit cec42f3

File tree

2 files changed

+74
-0
lines changed

2 files changed

+74
-0
lines changed

mappings/cvss_v3/cvss_v3.json

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,72 @@
33
"default": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
44
},
55
"content": [
6+
{
7+
"id": "cloud_security",
8+
"children": [
9+
{
10+
"id": "identity_and_access_management_iam_misconfigurations",
11+
"children": [
12+
{
13+
"id": "overly_permissive_iam_roles",
14+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
},
16+
{
17+
"id": "publicly_accessible_iam_credentials",
18+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
19+
}
20+
]
21+
},
22+
{
23+
"id": "storage_misconfigurations",
24+
"children": [
25+
{
26+
"id": "publicly_accessible_cloud_storage",
27+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
28+
},
29+
{
30+
"id": "unencrypted_sensitive_data_at_rest",
31+
"cvss_v3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
32+
}
33+
]
34+
},
35+
{
36+
"id": "network_configuration_issues",
37+
"children": [
38+
{
39+
"id": "open_management_ports_to_the_internet",
40+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
41+
},
42+
{
43+
"id": "lack_of_network_segmentation",
44+
"cvss_v3": "AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"
45+
}
46+
]
47+
},
48+
{
49+
"id": "misconfigured_services_and_apis",
50+
"children": [
51+
{
52+
"id": "exposed_debug_or_admin_interfaces",
53+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
54+
},
55+
{
56+
"id": "insecure_api_endpoints",
57+
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
58+
}
59+
]
60+
},
61+
{
62+
"id": "logging_and_monitoring_issues",
63+
"children": [
64+
{
65+
"id": "disabled_or_insufficient_logging",
66+
"cvss_v3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"
67+
}
68+
]
69+
}
70+
]
71+
},
672
{
773
"id": "ai_application_security",
874
"children": [

mappings/remediation_advice/remediation_advice.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,14 @@
1414
"https://owasp.org/www-project-top-10-for-large-language-model-applications/"
1515
]
1616
},
17+
{
18+
"id": "cloud_security",
19+
"remediation_advice": "Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.",
20+
"references": [
21+
"https://owasp.org/www-project-cloud-native-application-security-top-10/",
22+
"https://cloudsecurityalliance.org/artifacts/security-guidance-v4/"
23+
]
24+
},
1725
{
1826
"id": "algorithmic_biases",
1927
"children": [

0 commit comments

Comments
 (0)