Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 266d99a

Browse files
committed
environmental score and severity added to program book
1 parent 01f3070 commit 266d99a

File tree

4 files changed

+205
-0
lines changed

4 files changed

+205
-0
lines changed

docs/programs/environmental-score.html

Whitespace-only changes.

docs/programs/environmental-score.md

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: "Environmental Score"
3+
path: "/programs/environmental-score.html"
4+
id: "programs/environmental-score"
5+
---
6+
7+
The environmental score enables you to set the maximum [severity](severity.html) of an asset. It’s determined by setting impact levels to these 3 components:
8+
* Confidentiality
9+
* Integrity
10+
* Availability
11+
12+
<i>You can read more on these components in the section below on <b>Environmental Score Components<b>.</i>
13+
14+
To set the environmental score for an asset:
15+
1. Go to <b>Settings > Program > Scope</b>.
16+
2. Edit an existing asset to change the environmental score by selecting the degree of importance (None, Low, Medium, High) to each component.
17+
18+
### Effects to Severity
19+
Setting an environmental score for an asset caps the CVSS severity rating when a hacker calculates the severity for the asset in the submission report. The maximum severity a hacker can set for the asset is shown in the <b>Maximum severity</b> field.
20+
21+
For example: A program sets all 3 environmental score requirements to be None/Low for the asset `test.com` so that the maximum severity is set to None.
22+
23+
The hacker now can’t set the CVSS score for `test.com` to be Critical or High when submitting a report, even though the hacker selected all of the highest ratings on the CVSS calculator.
24+
25+
### Difference Between CVSS
26+
There are cases where the CVSS rating in HackerOne is vastly different from the actual CVSS site. For instance, a hacker can calculate the CVSS rating when submitting a report in HackerOne, only to find that the actual CVSS site gives a different severity score.
27+
28+
The discrepancy in severity ratings isn’t a mistake. The CVSS site gives a generic calculation for severity, whereas an asset with an environmental score in HackerOne will give a severity score that is specific to that particular asset in that program, and so, the severity score given in the product is going to be different from the score on the CVSS site.
29+
30+
### Environmental Score Components
31+
As mentioned above, the 3 components that make up the environmental score are:
32+
* Confidentiality
33+
* Integrity
34+
* Availability
35+
36+
#### Confidentiality
37+
Confidentiality refers to whether the data being obtained is actually confidential to the business. If a vulnerability were successfully exploited, this metric measures the impact of the confidentiality of the information that is at risk. To set the confidentiality level of the asset, you can choose from these 4 options:
38+
39+
Option | Details
40+
------ | --------
41+
None | There's no loss of confidentiality within the impacted component.
42+
Low | There's some loss of confidentiality. Access to some restricted information is obtained, but the attacker doesn't have control over what information is obtained or the amount or kind of loss that's constrained. The information disclosed doesn't cause a direct, serious loss to the impacted component.
43+
Medium | In between Low and High
44+
High | There's a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact.
45+
46+
#### Integrity
47+
Integrity refers to the trustworthiness of information. This metric measures the impact to the integrity of a successfully exploited vulnerability. To set the integrity level of the asset, you can choose from these 4 options:
48+
49+
Option | Details
50+
------ | --------
51+
None | There's no loss of integrity within the impacted component.
52+
Low | Modification of data is possible, but the attacker doesn't have control over the consequence of a modification. The amount of modification may be constrained, and there isn't a direct, serious impact on the affected component.
53+
Medium | In between Low and High
54+
High | There's a total loss of integrity or a complete loss of protection due to the vulnerability. For example, the attacker is able to modify any or all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.
55+
56+
#### Availability
57+
Availability refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component. To set the availability level of the asset, you can choose from these 4 options:
58+
59+
Option | Details
60+
------ | --------
61+
None | There's no impact to the availability within the impacted component.
62+
Low | There's reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker doesn't have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the impacted component.
63+
Medium | In between Low and High
64+
High | There's a total loss of availability resulting in the attacker being able to fully deny access to resources in the impacted component. This loss is either sustained (the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has finished). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component. For example, the attacker can't disrupt existing connections, but can prevent new connections, the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks only a small amount of memory, but after repeated exploitation causes a service to become completely unavailable.

package-lock.json

Lines changed: 137 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/pages/programs/programs-nav.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@
3737
path: /programs/scope-best-practices.html
3838
- title: Asset Types
3939
path: /programs/asset-types.html
40+
- title: Environmental Score
41+
path: /programs/environmental-score.html
4042
- title: Bounty Tables
4143
path: /programs/bounty-tables.html
4244
items:
@@ -87,6 +89,8 @@
8789
path: /programs/export-reports.html
8890
- title: Response Labels
8991
path: /programs/response-labels.html
92+
- title: Severity
93+
path: /programs/severity.html
9094
- title: Keyboard Shortcuts
9195
path: /programs/keyboard-shortcuts.html
9296
- title: Public Disclosure

0 commit comments

Comments
 (0)