The CISA Vulnrichment project is the public repository of CISA's enrichment of public CVE records through CISA's ADP (Authorized Data Publisher) container. In this phase of the project, CISA is assessing new and recent CVEs and adding key SSVC decision points. Once scored, some higher-risk CVEs will also receive enrichment of CWE and/or CVSS data points, where possible. Producers and consumers of
ã¢ã¡ãªã«æ¿åºCISAã«ãããæ¢ç¥ã®æªç¨ãããèå¼±æ§ã«ã¿ãã°ãã®æ¥æ¬èªè¨³
Malicious actors commonly use the following techniques to gain initial access to victim networks.[TA0001] Exploit Public-Facing Application [T1190] External Remote Services [T1133] Phishing [T1566] Trusted Relationship [T1199] Valid Accounts [T1078] Malicious cyber actors often exploit the following common weak security controls, poor configurations, and poor security practices to employ the initi
ãã®æç« ã«ã¤ã㦠米å½åå®å ¨ä¿éçãµã¤ãã¼ã»ãã¥ãªãã£ã»ã¤ã³ãã©ã¹ãã©ã¯ãã£ã»ãã¥ãªãã£åº(CISA)ã¨ç±³å½å®¶å®å ¨ä¿éå±(NSA)ã«ããªä½æãããKubernetes Hardening Guidance, Kuebrnetesç°å¢ã®ã»ãã¥ãªãã£ãããå ç¢ã«ããããã®ã¬ã¤ãã³ã¹ã翻訳ããã¿ããã®ã§ãã 訳è ã®è±èªåã¯å£æ» çã§ãã®ã§ãå¤ãã®èª¤è¨³ãªã©ãããã¨æãã¾ããçæããç®ã§è¦ã¦é ããã°ã¨æãã¾ãã®ã§ãããããé¡ããã¾ãã翻訳ã¯ä»¥ä¸ã§éææ´æ°ï¼ä¿®æ£ãã¦ããã¾ãã Kubernetes Hardening Guidance Disclaimer of warranties and endorsement ãã®ããã¥ã¡ã³ãã«å«ã¾ããæ å ±ã¨æè¦ã¯ç¾ç¶ã®ã¾ã¾ã§æä¾ããããã®ã§ãããããªãæ ¹æ ãä¿è¨¼ã¯ããã¾ãããããã«è¨è¼ããã¦ããç¹å®ã®åç¨è£½åãããã»ã¹ããµã¼ãã¹ã«ã¤ãã¦åå·ãåæ¨ã製é è ãç±³å½æ¿
ãç¥ãã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}