A Security Practices Evaluation Framework

Per Vulnerability Attributes


Description

While hundreds of security metrics have been proposed, tracking a relatively small set of attributes for each vulnerability detected in the software is sufficient to replicate many of them.

Definition

Data Collection

In addition to data kept for defects (e.g. those attributes listed by Lamkanfi [32]), we collect:

  • Source – The name of the bug tracker or bug-tracking database where the vulnerability is recorded.
  • Identifier – The unique identifier of the vulnerability in its source database.
  • Description – Text description of the vulnerability.
  • Discovery Date – Date the vulnerability was discovered.
  • Creation Date – Date the tracking record was created.
  • Patch Date – The date the change resolving the vulnerability was made.
  • Release Date – The date the software containing the vulnerability was released.
  • Severity – The criticality of the vulnerability. Scale: Low, Medium, High.
  • Phase – Indication of when during the development lifecycle the vulnerability was discovered
  • Reporter – Indication of who found the vulnerability
  • Role
  • (Optional) Identifier (name, email)