Главная
Study mode:
on
1
Intro
2
Security Response Management
3
General Security Patch Workflow
4
Upstream CVE Sources
5
CVE Workflow: Out-of-order/Delayed
6
A High Profile CVE - Simplified
7
Volume of CVE Data: Issues
8
Volume of CVE Data: Example
9
Tools: CVE System Analysis
10
Tools: CVE Build/Source Analysis
11
Security Management: Issues
12
Security Management Services
13
Defect systems vs. Security Management
14
Cost overview: Necessary costs
15
Cost overview: Unnecessary costs
16
Best Practices (2)
17
Introducing the SRTool
18
Srtool Features for Best Practices
19
SRTool: Vulnerability Page Example
20
SRTool: Object Model
21
SRTool: Functional Layout
22
Conclusion
Description:
Explore a comprehensive conference talk on managing security vulnerabilities in released products. Learn why common solutions like relying solely on MITRE's CVE database or upgrading to the latest software versions are flawed. Discover alternatives, best practices for reducing time between fix announcements and deployments, and effective strategies for staying current with security issues. Delve into the complexities of security response management, CVE workflows, and tools for CVE system and build/source analysis. Examine the challenges of security management, including cost considerations and the differences between defect systems and security management. Get introduced to the SRTool and its features designed to implement best practices in vulnerability management.

Keeping Up with CVEs - Security Response Management Best Practices

Linux Foundation
Add to list