aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-web/src/main/js/helpers/standards.json
diff options
context:
space:
mode:
authorPhilippe Perrin <philippe.perrin@sonarsource.com>2023-03-09 09:08:40 +0100
committersonartech <sonartech@sonarsource.com>2023-03-09 20:02:59 +0000
commitf314d64d267231885041484812676b531f4ee40b (patch)
tree9967736a3165b6d9017ff632a6f7d7338199c249 /server/sonar-web/src/main/js/helpers/standards.json
parentb9c74fb0fdda25ab929bf8add4d20d2236c6f6da (diff)
downloadsonarqube-f314d64d267231885041484812676b531f4ee40b.tar.gz
sonarqube-f314d64d267231885041484812676b531f4ee40b.zip
SONAR-18649 Remove the deprecated SANS Top 25 Security report
Diffstat (limited to 'server/sonar-web/src/main/js/helpers/standards.json')
-rw-r--r--server/sonar-web/src/main/js/helpers/standards.json16
1 files changed, 1 insertions, 15 deletions
diff --git a/server/sonar-web/src/main/js/helpers/standards.json b/server/sonar-web/src/main/js/helpers/standards.json
index 326c542d7bf..fbcfcd5f5a0 100644
--- a/server/sonar-web/src/main/js/helpers/standards.json
+++ b/server/sonar-web/src/main/js/helpers/standards.json
@@ -83,20 +83,6 @@
"description": "Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring."
}
},
- "sansTop25": {
- "insecure-interaction": {
- "title": "Insecure Interaction Between Components",
- "description": "These weaknesses are related to insecure ways in which data is sent and received between separate components, modules, programs, processes, threads, or systems."
- },
- "risky-resource": {
- "title": "Risky Resource Management",
- "description": "The weaknesses in this category are related to ways in which software does not properly manage the creation, usage, transfer, or destruction of important system resources."
- },
- "porous-defenses": {
- "title": "Porous Defenses",
- "description": "The weaknesses in this category are related to defensive techniques that are often misused, abused, or just plain ignored."
- }
- },
"cwe": {
"5": {
"title": "J2EE Misconfiguration: Data Transmission Without Encryption",
@@ -5275,4 +5261,4 @@
"level": "2"
}
}
-} \ No newline at end of file
+}