-
Notifications
You must be signed in to change notification settings - Fork 147
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Extend OCSF schema for ASPM Findings #1357
base: main
Are you sure you want to change the base?
Conversation
A couple thoughts: SBOM
What value does application_security_finding
The compliance examples provided are highly generic, focusing on broad best practices rather than actionable findings.
When I think of a compliance finding, I think of concrete findings, such as "Cloudtrail is not enabled in account X". As a consumer of the example data, I would only want to know about the CVEs in the packages. It feels like a good idea to decorate the
|
Signed-off-by: Jonathan Rau <139361268+jonrau-at-queryai@users.noreply.github.com>
Related issues
#1356
Description of changes:
As described in the Issue, ASPM/AppSec tools that report vulnerabilities typically have far more metadata than is possible to be mapped using the current attributes and objects available to Vulnerability Finding and the Vulnerabilities object. These run the gamut from policies, compliance requirements, SBOM details, exploit details, and more.
To that end I've made the following expansions on the schema
application_security_finding
Finding event class to encompass ASPM and wider DevSec/AppSec findings where multiple elements of compliance, remediation, policy, vulnerabilities, and weaknesses may be reported.dependency_chain
,exploit_requirement
, andexploit_type
(strings),uri
,end_column
,start_column
(integers), as well asexploit_reference_url
,license_url
, andpackage_manager_url
(url_t) to the dictionary.end_column
,rule
andstart_column
toaffected_code
objectcategory
anddesc
tocompliance
objecturi
to thefile
objectlicense_url
,package_manager
,package_manager_url
,src_url
, anduid
topackage
objecttype
,type_id
,uid
, andversion
tosbom
objectcategory
,dependency_chain
,exploit_reference_url
,exploit_requirement
, andexploit_type
tovulnerability
objectadvisory.uid
as an Observable (type_id: 39
)Server Screenshots
Advisory UID Observable

Application Security Finding

Affected Code

File

Package

SBOM

Vulnerability

Mapping
This is based on the demo data you can place into OX Security
Raw
Mapped