Vulnerability Management

Get Started. It's Free
or sign up with your email address
Vulnerability Management by Mind Map: Vulnerability Management

1. Open Web Application Security Project (OWASP)

1.1. Mobile Application Security Verification Standard (MASVS)

1.1.1. 1.11 MSTG-ARCH-11

1.1.2. 7.5 MSTG-CODE-5

1.2. Application Security Verification Standard 4.0.3 (ASVS)

1.2.1. V10.1 Code Integrity

2. ioXt Alliance

2.1. Mobile Application Profile

2.1.1. 4.9. Vulnerability Reporting Program VDP1

2.1.2. 4.9. Vulnerability Reporting Program VDP2

2.1.3. 4.9. Vulnerability Reporting Program VDP3

2.1.4. 4.9. Vulnerability Reporting Program VDP4

2.1.5. 4.9. Vulnerability Reporting Program VDP5

3. National Information Assurance Partnership (NIAP)

3.1. Requirements for Vetting Mobile Apps from the Protection Profile for Application Software

3.1.1. Security Assurance Requirements AVA_VAN.1.2E

4. US National Institute of Standards and Technology (NIST)

4.1. NIST Special Publication 800-190

4.1.1. 4.1.1 Image vulnerabilities

4.1.2. 4.1.3 Embedded malware

4.1.3. 4.4.1 Vulnerabilities within the runtime software

4.1.4. 4.4.4 App vulnerabilities

4.1.5. 4.4.5 Rogue containers

4.2. NIST Special Publication 800-163 Revision 1

4.2.1. 2.2 Organization-Specific Requirements App Documentation