|
|
Netcraft Ltd
www.netcraft.com
Audited by Netcraft
https://audited.netcraft.com/audited
Provide a short description of how and where your capability is made available to your customers and the public (required):
Mappings are made between vulnerability issues detected by the Audited by Netcraft service and CVE dictionary names. The mappings are in the form of a CVE link in an HTML (or PDF) report.
Describe how and where your capability indicates the most recent CVE version used to create or update its mappings (required):
The version of the CVE database used is printed at the bottom of the report. Reference to this is made in the documentation.
"* CVE names refer to the CVE database dated 2009-10-04."
Indicate how often you plan on updating the mappings to reflect new CVE versions and describe your approach to keeping reasonably current with CVE versions when mapping them to your repository (required):
Updates to the CVE database are downloaded on a daily basis from the National Vulnerability Database feeds at http://nvd.nist.gov/download.cfm. The full database is fetched every 7 days. Our software automatically updates its own database of vulnerability information using the downloaded CVE database.
Describe how and where you explain to your customers the timeframe they should expect an update of your capability's mappings to reflect newly available CVE content (required):
This is described in the CVE link (a link in the document Navigation Bar)
Describe the criteria used for determining the relevance of a given CVE Identifier to your Capability (required):
New vulnerability tests are added to the Audited by Netcraft service on a regular basis. Each new vulnerability will include a CVE Identifier (if one has been assigned to the vulnerabilty in question). The references for the given CVE Identifier will be checked to ensure that the CVE Identifier is correct.
Describe the mechanism used for reviewing CVE for content changes (required):
Updates to the CVE database are downloaded on a daily basis from the National Vulnerability Database feeds at http://nvd.nist.gov/download.cfm.
"nvdcve-2.0-modified.xml includes all recently published and recently updated vulnerabilities"
Describe the source of your CVE content (required):
New vulnerabilities (together with their corresponding CVE Identifiers) are sourced from security-related mailing lists and feeds, security-focused web-sites, discussion groups, vendor announcements, advisories and bulletins, and our own security research.
Provide a copy, or directions to its location, of where your documentation describes CVE and CVE compatibility for your customers (required):
A link is provided in the Navigation Bar at the top of the page:
https://audited.netcraft.com/netexam/cve
The user of the service gets an HTML or PDF report with a link to the appropriate CVE definition at MITRE. The only documentation that is required is a small entry in our Help file and a link to this page:
Fig 1. Screen shot of CVE Name mapping example (note link to MITRE cvename.cgi in browser status bar)
Provide a copy, or directions to its location, of where your documentation describes the specific details of how your customers can use CVE names to find the individual security elements within your capability's repository (required):
https://audited.netcraft.com/netexam/cve
Any vulnerabilities which are discovered and for which a CVE entry exists are highlighted in the vulnerability table of the report, together with a link to the appropriate CVE entry. See fig1 above.
Provide a copy, or directions to its location, of where your documentation describes the process a user would follow to find the CVE names associated with individual security elements within your capability's repository (required):
As you can see in fig 1. The user simply has to click on the CVE name.
If your documentation includes an index, provide a copy of the items and resources that you have listed under "CVE" in your index. Alternately, provide directions to where these "CVE" items are posted on your web site (recommended):
No index is provided in the service.
Give detailed examples and explanations of the different ways that a user can use CVE names to find out which security elements are tested or detected by the service (i.e. by asking, by providing a list, by examining a coverage map, or by some other mechanism) (required):
A user may ask (by email, phone, fax etc.) if a CVE name is detected by the service.
Give detailed examples and explanations of how, for reports that identify individual security elements, the user can determine the associated CVE names for the individual security elements in the report (required):
A link is provided in the report that maps a detected vulnerability to a CVE name. See fig 1.
Please provide the name and version number of any product that the service allows users to have direct access to if that product identifies security elements (recommended):
The service does not allow clients to have direct access to the underlying vulnerability scanner.
Give detailed examples and explanations of how a "find" or "search" function is available to the user to locate tasks in the online capability by looking for their associated CVE name or through an online mapping that links each element of the capability with its associated CVE name(s) (required):
The find function of the browser can be used. See fig 1. for report layout of CVE mapping.
Provide a detailed description of how someone can use your "URL template" to interface to your capability's search function (recommended):
By design we do not include input forms in the report. The find function is sufficient.
Give detailed examples and explanations of how, for reports that identify individual security elements, the online capability allows the user to determine the associated CVE names for the individual security elements in the report. (required):
The CVE name is used as the link to MITRE (see fig 1.) attachment
Provide details about the different electronic document formats that you provide and describe how they can be searched for specific CVE-related text (required):
HTML - Use find function of browser
PDF - Use find function of PDF viewer
Spreadsheet downloadable - Use search function of spreadsheet tool
Printable format - Use word processor word search
If one of the capability's standard electronic documents only lists security elements by their short names or titles provide example documents that demonstrate how the associated CVE names are listed for each individual security element (required):
Provide example documents that demonstrate the mapping from the capability's individual elements to the respective CVE name(s) (recommended):
Give detailed examples and explanations of how the GUI provides a "find" or "search" function for the user to identify your capability's elements by looking for their associated CVE name(s) (required):
Simply by using the find function of the browser.
Briefly describe how the associated CVE names are listed for the individual security elements or discuss how the user can use the mapping between CVE entries and the capability's elements, also describe the format of the mapping (required):
They are listed as a links. See fig 1.
Provide details about the different electronic document formats that you provide for exporting or accessing CVE-related data and describe how they can be searched for specific CVE-related text (recommended):
Exported in CSV format for spreadsheet analysis. Use of spreadsheet search function can be used for searching.
Similarly a printable version is provided
Have an authorized individual sign and date the following Compatibility Statement (required):
"As an authorized representative of my organization I agree that we will abide by all of the mandatory CVE Compatibility Requirements as well as all of the additional mandatory CVE Compatibility Requirements that are appropriate for our specific type of capability."
Name: Colin Phipps
Title: Internet Services Manager
Have an authorized individual sign and date the following accuracy Statement (recommended):
"As an authorized representative of my organization and to the best of my knowledge, there are no errors in the mapping between our capability's Repository and the CVE entries our capability identifies."
Name: Colin Phipps
Title: Internet Services Manager