|
Root Cause Mapping of Vulnerabilities
“Root cause mapping” is the identification of the underlying cause(s) of a vulnerability. This is best done by correlating CVE Records and/or bug or vulnerability tickets with CWE entries.
Accurate and precise root cause mapping is valuable because it directly illuminates where investments, policy, and practices can address the root causes responsible for vulnerabilities so that they can be eliminated.
View our new and improved root cause mapping guidance here.
|
|
|
|
|
More information is available — Please edit the custom filter or select a different filter.
|