This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Technical Impact template"
From OWASP
m (TI template moved to Technical Impact template) |
|||
Line 1: | Line 1: | ||
− | + | Every '''[[Technical Impact]]''' should follow this template. | |
==Description== | ==Description== | ||
− | This is the | + | A technical impact is the system damage that results from a successful security breach. This is just the effect on the technology, not the business. |
+ | # Start with a one-sentence description of the technical impact | ||
+ | # Describe the technical damage done to the system | ||
+ | # Note the security interest that is damaged - confidentiality, integrity, availability, accountability | ||
+ | # Is the damage immediate or spread over a time period? | ||
+ | |||
+ | |||
+ | ==Risk Factors== | ||
+ | * Talk about the [[OWASP Risk Rating Methodology|factors]] that govern this technical impact | ||
+ | * Try to be clear about the factors that make this impact serious | ||
− | |||
+ | ==Examples== | ||
− | + | ; Short example name | |
+ | : One paragraph example description with [http://www.site.com links] | ||
+ | ; Short example name | ||
+ | : One paragraph example description with [http://www.site.com links] | ||
− | ==Related Business Impacts== | + | |
+ | ==Related [[Vulnerabilities]]== | ||
+ | |||
+ | * [[Vulnerability 1]] | ||
+ | * [[Vulnerabiltiy 2]] | ||
+ | |||
+ | |||
+ | ==Related [[Countermeasures]]== | ||
+ | |||
+ | * [[Countermeasure 1]] | ||
+ | * [[Countermeasure 2]] | ||
+ | |||
+ | |||
+ | ==Related [[Business Impacts]]== | ||
+ | |||
+ | * [[Business Impact 1]] | ||
+ | * [[Business Impact 2]] | ||
==References== | ==References== | ||
+ | * http://www.link1.com | ||
+ | * [http://www.link2.com Title for the link] | ||
− | |||
− | <nowiki>[[Category: | + | When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category |
+ | <nowiki>[[Category:OWASP Honeycomb Project]]</nowiki> | ||
+ | <nowiki>[[Category:OWASP ASDR Project]]</nowiki> | ||
+ | |||
+ | __NOTOC__ |
Revision as of 05:05, 13 February 2008
Every Technical Impact should follow this template.
Description
A technical impact is the system damage that results from a successful security breach. This is just the effect on the technology, not the business.
- Start with a one-sentence description of the technical impact
- Describe the technical damage done to the system
- Note the security interest that is damaged - confidentiality, integrity, availability, accountability
- Is the damage immediate or spread over a time period?
Risk Factors
- Talk about the factors that govern this technical impact
- Try to be clear about the factors that make this impact serious
Examples
- Short example name
- One paragraph example description with links
- Short example name
- One paragraph example description with links
Related Vulnerabilities
Related Countermeasures
Related Business Impacts
References
When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category
[[Category:OWASP Honeycomb Project]]
[[Category:OWASP ASDR Project]]