This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vulnerability Management Guide"
(→Project Leader) |
m |
||
(12 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
− | | | + | | style="border-right: 1px dotted gray;padding-right:25px;" valign="top" | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ==OWASP Vulnerability Management Guide== | |
− | ==OWASP | + | <span style="color:#000000"> |
− | <span style="color:# | + | Vulnerability management is one of the most effective means of controlling cybersecurity risk. Yet, as indicated by the wave of massive data breaches and ransomware attacks, all too often organizations are compromised over missing patches and misconfigurations. Vulnerability management seeks to help organizations identify such weaknesses in its security posture so that they can be rectified before they are exploited by attackers. The OWASP Vulnerability Management Guide project seeks to establish guidance on the best practices that organizations can use establish a vulnerability management program within their organization. The guide provides in depth coverage of the full vulnerability management lifecycle including the preparation phase, the vulnerability identification/scanning phase, the reporting phase, and remediation phase. |
− | |||
</span> | </span> | ||
− | The | + | ==Description== |
+ | <span style="color:#000000"> | ||
+ | The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored to your organizational needs. Target audience: information security practitioners of all levels, IT professionals, and business leaders. | ||
− | + | [[Talk:OWASP_Vulnerability_Management_Guide#OWASP_Vulnerability_Management_Guide_v.1|Vulnerability Management Cycle]]: | |
− | + | * DETECTION | |
− | + | * REPORTING | |
+ | * REMEDIATION | ||
</span> | </span> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Licensing== | ==Licensing== | ||
− | <span style="color:# | + | <span style="color:#000000"> |
− | + | The OWASP Vulnerability Management project is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | |
</span> | </span> | ||
− | |||
− | |||
==Roadmap== | ==Roadmap== | ||
− | <span style="color:# | + | <span style="color:#000000"> |
− | As of | + | As of '''September 2018''', the highest priorities for the next 8 months are: |
− | + | * a “bare bones” list (done!); | |
− | * | + | * a logical diagram (coming soon); |
− | * | + | * a Power Point presentation (coming soon); |
− | * | + | * a DIY guide with notes that reference controls, useful sources, and examples (coming 2019); |
− | * | + | * a DIY guide with the notes, examples, and illustrations (coming 2020). |
− | |||
− | Subsequent | + | Subsequent releases will be unscheduled: |
− | + | * Bug Fix | |
− | * Internationalization | + | * Internationalization |
− | |||
− | |||
− | |||
− | + | </span> | |
− | <span | ||
− | |||
− | |||
− | |||
− | | valign="top" style="padding-left:25px;width:200px | + | | valign="top" style="padding-left:25px;width:200px;" | |
− | == | + | ==Getting Involved== |
− | <span style="color:# | + | <span style="color:#000000"> |
− | + | Get Involved by: | |
+ | * '''Promoting'''. Please spread the word! | ||
+ | * '''Adopting'''. The best contribution is your adoption! | ||
+ | * '''Collaborating'''. Please specify in comments how would you like to contribute on [https://github.com/lizfrenz/owasp-vuln-mngmnt GitHub]. | ||
</span> | </span> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Project Leader == | == Project Leader == | ||
<span style="color:#000000"> | <span style="color:#000000"> | ||
− | + | * [https://www.owasp.org/index.php/User:Efrenz Elizabeth Frenz] | |
</span> | </span> | ||
− | == | + | == Donate to OWASP == |
− | < | + | <div class="center" style="width: auto; margin-left: auto; margin-right: auto;">{{#widget:PayPal Donation |
− | + | |target=_blank | |
− | </ | + | |budget=Other (Website Donation) }}</div> |
− | |||
− | |||
==Classifications== | ==Classifications== | ||
Line 99: | Line 64: | ||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]] |
|- | |- | ||
− | | | + | | rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]] |
− | | | + | | width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=Builders]] |
|- | |- | ||
− | | | + | | width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=Defenders]] |
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]] |
|} | |} | ||
|} | |} | ||
Line 112: | Line 77: | ||
__NOTOC__ <headertabs /> | __NOTOC__ <headertabs /> | ||
− | [[Category:OWASP Project]] [[Category:OWASP_Document]] | + | [[Category:OWASP Project]] |
+ | [[Category:OWASP_Document]] |
Latest revision as of 03:17, 2 May 2019
OWASP Vulnerability Management GuideVulnerability management is one of the most effective means of controlling cybersecurity risk. Yet, as indicated by the wave of massive data breaches and ransomware attacks, all too often organizations are compromised over missing patches and misconfigurations. Vulnerability management seeks to help organizations identify such weaknesses in its security posture so that they can be rectified before they are exploited by attackers. The OWASP Vulnerability Management Guide project seeks to establish guidance on the best practices that organizations can use establish a vulnerability management program within their organization. The guide provides in depth coverage of the full vulnerability management lifecycle including the preparation phase, the vulnerability identification/scanning phase, the reporting phase, and remediation phase. DescriptionThe vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored to your organizational needs. Target audience: information security practitioners of all levels, IT professionals, and business leaders. Vulnerability Management Cycle:
LicensingThe OWASP Vulnerability Management project is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. RoadmapAs of September 2018, the highest priorities for the next 8 months are:
Subsequent releases will be unscheduled:
|
Getting InvolvedGet Involved by:
Project Leader
Donate to OWASPClassifications
|