Giter VIP home page Giter VIP logo

reference-security-incident-taxonomy-task-force's People

Contributors

aaronkaplan avatar adulau avatar amicaross avatar cudeso avatar flosada avatar gabrielcurrie avatar incibe-cert avatar jensoliver avatar jhemp avatar kaweechelchen avatar palkmla avatar sebix avatar th-certbund avatar vanessaprocacci avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

reference-security-incident-taxonomy-task-force's Issues

Predicate (1st category of classification) description text is not reflected in human readable file

From this code and below (defining 1st category, in JSON called "predicates" information is not exposed in human readable format).

In particular, let's take following predicates - some of them do not have bigger descriptions, but some have:
The ones which do not have (example):

"value": "abusive-content"
"description": "Abusive Content.",

"value": "information-gathering"
"description": "Information Gathering.",

While some predicates (1st classification category) has longer texts, which are not exposed in the human readable table):
"value": "malicious-code"
"description": "Software that is intentionally included or inserted in a system for a harmful purpose. A user interaction is normally necessary to activate the code.",

Suggestion - to modify https://github.com/enisaeu/Reference-Security-Incident-Taxonomy-Task-Force/blob/master/working_copy/humanv1.md - probably provide additional table for only predicates, or provide extra lines for each 1st category.

Update of terms in 2nd column and description of Abusive Content

Child Porn and Child pornography are not terms used nowadays. Time ago specialists and authorities started using instead Child Sexual Exploitation (CSE) and/or Child Sexual Abuse (CSA) as more appropriated terms to refer these crimes.
I guess it makes sense to update the taxonomy to reflect current denominations.

Link the taxonomy to the ENISA Threat Landscape (and threat taxonomy)

One of the purposes of using an incident taxonomy, next to many, is to have a view on trending of security incidents for your organisation and then map this to the 'public' threats. The reference material to use is the Threat Landscape Report from ENISA.

Current taxonomy misses a link with the threat taxonomy used in the TLR.

discuss dropzones

This is just a reminder to discuss how dropzones can be classified in the RSIT, as discussed on the mailing list to reach a consensus and document that.

multiple values: OK or not OK?

We mentioned a couple of times that the taxonomy says nothing about the situation of multiple values.
One could imagine a situation where multiple values make sense (for example assigning "Vulnerable"/"Weak crypto" as well as "Vulnerable/"DDoS Amplifier" to a web server which also hosts a (open) DNS server).

I guess it's ok to use the taxonomy tags differently in different contexts. But some text describing how the taxonomy should be used in different contexts might make sense.

At the meeting in Hamburg we discussed that there are multiple use-cases for the taxonomy. Maybe listing the known use-cases brings in clarity to this topic.

But the question of multiple values really should be addressed before we even start comparing stats which follow the reference security incident taxonomy.

Unauthorized vs Unauthorised

Unauthorised access to information and Unauthorised modification of information

vs.

Unauthorized use of resources

Illegal content classification

Even if as a CSIRT you usually don't have to deal with illegal content (e.g. "child exploitation") per se. It happens that we receive materials or information which need to be acted upon and forwarded to the appropriated organisation (e.g. INHOPE or national stop line). I would recommend to add an "illegal content" classification to properly label such information for manual or/and automatic processing.

Open changes for the next major version

To not forget what we wanted to change in an upcoming major version, we collect some non-urgent, but major changes here:

  • convert all names to singular (#114)
  • rename information-content-security to information-security (#113)

Does the RSIT define a "security incident"?

The RSIT is described as a reference taxonomy for "security incidents" - is this term currently formally defined in the RSIT, and if not, should it be?

For example, I note that the current version of RSIT includes things that might be thought of as physical security issues (e.g., "Burglary" or "Sabotage") and safety or business continuity issues (e.g., "Outage"). Does the RSIT therefore cover these as well as cyber security incidents, and is this worth explicitly stating (via a definition)?

As a starter, NIST has a range of definitions, as does the UK's NCSC. ENISA has a glossary but this doesn't include anything to do with incidents.

Use of plurals

Some RSIT use Plural in the (sub)classification names:

  • Intrusion Attempts
  • Intrusions
  • Login Attempts
  • Potentially Unwanted Accessible Services

However, most of them are in singular:

  • Denial of Service
  • {Account,Application,System} Compromise
  • Unauthorised Modification of Information
  • Misconfiguration
  • Vulnerable
  • Burglary
  • Vulnerable System
  • Phishing
  • etc.

Use of singular seems better suited. If you suffer an incident it is an intrusion, not intrusions.

Expected action: rename the plural names to singular form

Non-deterministic convert-rsit-to-attck.py

Running convert-rsit-to-attck.py creates new uuids on clusters/rsit.json and galaxies/rsit.json (in addition of reordering the output), resulting in semantically different files.

Add a predicate to tag information if this is part of an exercise

I would propose the addition of a predicate called "exercise" to tag information if this is part of an exercise.

rsit:exercise="cyber-europe-2018"
rsit:exercise="locked-shields-2019"

This helps for automation and filtering to avoid polluting production sharing communities.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.