Discuss this topic in Circle
Have an interesting article or video on this topic that you want to share? Anyone can join the discussion community for this topic to share ideas or ask questions.View discussion community
Participate in Global Security Database (GSD) Research
The mission of this working group is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification.
|Anchore to Contribute Grype Open Source Vulnerability Data to the Global Security Database||IT Security News||March 29, 2022|
|Anchore to Contribute Grype Open Source Vulnerability Data to the Global Security Database||AiThority||March 30, 2022|
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Global Security Database Working Group Charte
The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification. Using the same style of open source collaborative techniques that have worked to create the software ecosystem that we have today, the CSA is creating a community focused working group meant to replicate this success in the vulnerability identifier problem space. The project is not limited to vulnerabilities in the cloud as we are seeing the same problems and increase in attacks across all forms of IT infrastructure. The common design goal is for vulnerability identifiers to be easily discovered, fast to assign, updatable, and publicly available.