<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVSS - Prioritization in Threats</title>
    <link>https://community.isc2.org/t5/Threats/CVSS-Prioritization/m-p/73361#M1360</link>
    <description>&lt;P&gt;Hi&amp;nbsp; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We generally rate/ ranks our pen testing and other security Risks using the &lt;A href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" target="_blank" rel="noopener"&gt;CVSS&lt;/A&gt; methodology .&amp;nbsp; The big gap we find is that in certain cases we have&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) A high CVSS threat mapped against a low value asset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) A high CVSS threat mapped against a very very complex exploit&amp;nbsp; which has very low probability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone tried the usage &lt;A href="https://www.first.org/epss/research" target="_blank" rel="noopener"&gt;EPSS&lt;/A&gt;&amp;nbsp;for this purpose ?&amp;nbsp; Do teams use DREAD on top of CVSS ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your thoughts .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 25 Aug 2024 05:33:17 GMT</pubDate>
    <dc:creator>rsrinivasanhome</dc:creator>
    <dc:date>2024-08-25T05:33:17Z</dc:date>
    <item>
      <title>CVSS - Prioritization</title>
      <link>https://community.isc2.org/t5/Threats/CVSS-Prioritization/m-p/73361#M1360</link>
      <description>&lt;P&gt;Hi&amp;nbsp; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We generally rate/ ranks our pen testing and other security Risks using the &lt;A href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" target="_blank" rel="noopener"&gt;CVSS&lt;/A&gt; methodology .&amp;nbsp; The big gap we find is that in certain cases we have&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) A high CVSS threat mapped against a low value asset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) A high CVSS threat mapped against a very very complex exploit&amp;nbsp; which has very low probability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone tried the usage &lt;A href="https://www.first.org/epss/research" target="_blank" rel="noopener"&gt;EPSS&lt;/A&gt;&amp;nbsp;for this purpose ?&amp;nbsp; Do teams use DREAD on top of CVSS ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your thoughts .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 05:33:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CVSS-Prioritization/m-p/73361#M1360</guid>
      <dc:creator>rsrinivasanhome</dc:creator>
      <dc:date>2024-08-25T05:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS - Prioritization</title>
      <link>https://community.isc2.org/t5/Threats/CVSS-Prioritization/m-p/73369#M1362</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/939039773"&gt;@rsrinivasanhome&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;1) A high CVSS threat mapped against a low value asset&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Even a low-value asset can be used as a "jump box" to attack higher valued assets or to launch an internal denial-of-service attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;2) A high CVSS threat mapped against a very very complex exploit which has very low probability.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That is already baked into the CVSS score.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use the CVSS primarily to set a "remediation deadline", which is then adjusted primarily based on how publicly accessible the device is.&amp;nbsp; So, a webserver in the DMZ may well get a same-day update, laptops "tomorrow night", and isolated assembly-line equipment may end up waiting for 3rd shift Sunday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since most mitigations are "patch and reboot", it really helps to have an automated patching system (e.g. WSUS).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also strongly emphasize "if you can not afford downtime, invest in High-Availability and/or in network isolation".&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 04:00:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CVSS-Prioritization/m-p/73369#M1362</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-08-26T04:00:22Z</dc:date>
    </item>
  </channel>
</rss>

