|
|
|
Before You Start
- Review the CWE mapping examples
- Try to frame your perspective of the vulnerability to its underlying weakness
- Become familiar with key terms in CWE's glossary so that you can be sure you are interpreting CWE names correctly
- Familiarize yourself with key views (CWE-699, CWE-1194, CWE-1400,and CWE-1000), and determine which ones seem to match your needs the best
- Become familiar with the top-level CWEs in your preferred view
When You Are Ready
- The keyword search on the CWE website can help you quickly find potential entries, regardless of their level of abstraction
- CWEs at the Base and Variant level should be used for vulnerability root cause mapping whenever possible. Class level CWEs may be used for root cause mapping if there is no accurate Base or Variant level CWE. Check under the CWE’s title for its Abstraction and a link to its Mapping Notes
- Verify your mapping with a team member with different skills and experience
- If you find an entry similar but not quite what you are looking for, then examine its relationships with other CWEs
More information is available — Please edit the custom filter or select a different filter.
|