Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 4b5b8fe

Browse files
committed
fixed formatting
1 parent a93085f commit 4b5b8fe

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

docs/programs/scope-best-practices.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,7 @@ Here are some practical guidelines to help you define and set up your scope:
1717
* The common best practice is to only offer bug bounties for specific assets, and to slowly expand that list over time. Set proper expectations with hackers by explicitly white-listing those assets that are eligible for bounties.
1818
* If possible, explain why in the instructions field. Over communication helps prevent future disagreements. 
1919
* **Set the Environmental Score for the Asset**.
20-
* The [environmental score](environmental-score.html) determines the severity of the vulnerability for the asset. You can set the environmental score for these 3 metrics:
21-
* 1) Confidentiality: Whether the data being obtained is actually confidential to their business, i.e., if there is a business risk when the data is leaked.
22-
* 2) Integrity: What the business risk is if the data is modified
23-
* 3) Availability: Business risk depending on if the component is on or offline
20+
* The [environmental score](environmental-score.html) determines the severity of the vulnerability for the asset. You can set the environmental score for these 3 metrics: <br>1) Confidentiality: Whether the data being obtained is actually confidential to their business, i.e., if there is a business risk when the data is leaked.<br>2) Integrity: What the business risk is if the data is modified <br>3) Availability: Business risk depending on if the component is on or offline
2421
* Not all of your assets are created equal. You should take the time to assess potential business impact and configure these fields in order to:
2522
* Create alignment in expectations by prioritizing business critical assets.
2623
* Constrain maximum severity for the asset so that hackers can't give you alerts that there's a "critical" vulnerability in your static marketing site.

0 commit comments

Comments
 (0)