As mentioned in the U.S. "INTERNATIONAL STRATEGY FOR CYBERSPACE"[1] document, we need "interoperable and secure technical standards, determined by technical experts".

I would like to introduce my vision of "Software Vulnerability Mitigation Automation"
via IVIL v1.0 via a (incomplete) Conceptual Map.

Requirements: ~15 minutes of your time, a headset and the Boléro

https://corevidence.com/research/vulnerability_interoperability_ivil_v1.jpg

(I extracted some links, please see below)



i = x2ivil + ivil2x
where "i" is interoperability and "x" a software (vulnerability scanner,... + waf, virtual patching system, ...)

What do you think?

Thank you.
Best regards,

Jerome Athias - NETpeas
VP, Director of Software Engineer
Palo Alto - Paris - Casablanca
http://www.netpeas.com

"The computer security is an art form. It's the ultimate martial art."



[1] http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace IVIL-XML http://www.cupfighter.net/index.php/2010/10/ivil-an-xml-schema-to-exchange-vulnerability-information/
ThreadFix http://code.google.com/p/threadfix/

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to