Mitigations
Mitigate your vulnerabilities
Last updated
Mitigate your vulnerabilities
Last updated
A mitigation in this context refers to vulnerability mitigation. Vulnerability mitigation is the process of reducing or eliminating the risk associated with a security vulnerability.
A software may often contain vulnerabilities of various severity. One way to mitigate these vulnerabilities is to fix all of them. Another way of mitigating these vulnerabilities is to analyze the risk associated with the vulnerabilities in the context of the application and publishing a CSAF.
The vulnerability count after applying the mitigations becomes the effective vulnerability count. This is shown by the Lineaje risk graph in the Info tab. The black start represents the project risk with the actual vulnerabilities present. The blue star represents the project risk re-evaluated after applying the vulnerability mitigations.
The mitigations tab lists all the vulnerability mitigations that are uploaded in the form of CSAF.
Count of components that are mitigated is displayed towards left, along with the category of the components (open-source, private, third-party, unknown).
The mitigation count is displayed towards the right, grouped by severity (critical, high, medium, low).
Each tile is clickable which will list down the components applicable to that filter in a table view. The details will list the component name, version, total vulnerabilities and a capsule for vulnerabilities details.
By clicking the vulnerabilities capsule, next level details will be shown as below.
By clicking on any row, the sidesheet shows up as shown below. There is a section showing the mitigation related information - mitigation origin, mitigation category, mitigation details. This information is sourced from the CSAF that was uploaded.
CSAF stands for Common Security Advisory Framework. Common Security Advisory Framework (CSAF) is a language to exchange Security Advisories. It plays a crucial role in the cybersecurity arena since it allows stakeholders to automate the creation and consumption of security vulnerability information and remediation. More details can be found here.
https://oasis-open.github.io/csaf-documentation/
https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html
CSAF upload is available under Integrations from the left navigation bar. A CSAF document is a json that describes the mitigations for the vulnerabilities and the products that are applicable for. You can refer a sample CSAF
A sample CSAF document looks something like this
Lineaje platform will re-calculate the overall risk score of your application based on the mitigations provided by the CSAF document. The IRL gets recalculated the Lineaje Risk Graph shows a new blue star in the new quadrant.
A CSAF upload will result in the re-assessment of all projects across the different Lineaje products (SBOM360, SBOM360Hub, OSM). The re-assessment assumes the project names to match with the project names shown in the projects page(from left navigation bar). The project name and version should be separated by "__" in the CSAF document.
For apache-zookeeper:3.7.1, here is a sample from CSAF document
Lineaje platform provides you options to generate a CSAF document.
If mitigations were applied to projects, those status will be included in the generated CSAF document
If no mitigations were applied, then Lineaje platform makes the status of each project as "under_investigation". Once the vulnerability analysis is done, this CSAF document can be updated and then uploaded back in Lineaje to calculate the new risk of the projects.
CSAF document can be generated for a project or for a vulnerability or for a SKU(list of associated projects) etc.
Projects page (from left navigation bar) provides an option under "Action" menu to download a CSAF for the project
Serach page (from left navigation bar) provides an option to download CSAF. This option is very flexible. A CSAF can be generated for a CVE or for a project or for an organization or for the entire company. Here is an example to generate CSAF for a CVE