You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/TestAndVerification/Consolidation.yaml
+30-12Lines changed: 30 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -139,10 +139,17 @@ Test and Verification:
139
139
comments: ""
140
140
Simple false positive treatment:
141
141
uuid: c1acc8af-312e-4503-a817-a26220c993a0
142
-
risk:
143
-
As false positive occur during each test, all vulnerabilities might be
144
-
ignored. Specially, if tests are automated an run daily.
145
-
measure: |-
142
+
description: |
143
+
Security tests may produce false positives—findings that are incorrectly identified as vulnerabilities.
144
+
145
+
It is important distinguish these from true vulnerabilities to avoid wasting time and resources on non-issues.
146
+
147
+
False positive treatment ensures that findings from security tests are triaged and documented, allowing teams to distinguish between real vulnerabilities and false positives. This reduces unnecessary work and helps maintain focus on true risks.
148
+
149
+
Some positive findings might be considered an accepted risk by the organization. This must also be documented.
150
+
risk: |
151
+
If false positives are not managed, teams may ignore all findings, leading to real vulnerabilities being overlooked and increasing the risk of exploitation. Specially, if tests are automated an run daily.
152
+
measure: |
146
153
Findings from security tests must be triaged and outcomes persisted/documented to:
147
154
- Prevent re-analysis of known issues in subsequent test runs
Treatment of defects with severity high or higher:
276
285
uuid: 44f2c8a9-4aaa-4c72-942d-63f78b89f385
277
-
risk: Vulnerabilities with severity high or higher are not visible.
278
-
measure:
279
-
Vulnerabilities with severity high or higher are added to the quality
280
-
gate.
286
+
description: |
287
+
All security problems that are rated as "high" or "critical" must be fixed before the software can be released or used in production. This means that if a serious vulnerability is found, it cannot be ignored or postponed.
288
+
risk: |
289
+
If serious security problems are not fixed, attackers could exploit them to steal data, disrupt services, or cause other harm. Ignoring these issues puts the organization, its customers, and its reputation at risk.
290
+
measure: |
291
+
- Make it a rule that all high or critical security findings must be fixed before the software is approved for release or use.
292
+
- Track these issues and make sure they are resolved quickly.
293
+
- Pay extra attention to Known Exploited Vulnerabilities (KEV) from CISA and EPSS scores when prioritizing fixes.
294
+
assessment: |
295
+
There is clear evidence that all high or critical security issues are tracked and fixed before release. No high or critical issues remain open in production systems.
296
+
comments: False positive analysis, specially for static analysis, is time consuming.
297
+
level: 1
281
298
difficultyOfImplementation:
282
299
knowledge: 2
283
300
time: 2
284
301
resources: 1
285
302
usefulness: 4
286
-
level: 1
287
-
comments: False positive analysis, specially for static analysis, is time consuming.
0 commit comments