Enumeration ExternalReferenceType

Generated

from enum cyclonedx.v1_5.ExternalReferenceType

Enumeration Members

ADVERSARY_MODEL: 18

The defined assumptions, goals, and capabilities of an adversary.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_ADVERSARY_MODEL = 18;

ADVISORIES: 4

Security advisories

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_ADVISORIES = 4;

ATTESTATION: 16

Human or machine-readable statements containing facts, evidence, or testimony

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_ATTESTATION = 16;

BOM: 5

Bill-of-material document (CycloneDX, SPDX, SWID, etc)

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_BOM = 5;

BUILD_META: 13

Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_BUILD_META = 13;

BUILD_SYSTEM: 14

URL to an automated build system

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_BUILD_SYSTEM = 14;

CERTIFICATION_REPORT: 29

Industry, regulatory, or other certification from an accredited (if applicable) certification body

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_CERTIFICATION_REPORT = 29;

CHAT: 8

Real-time chat platform

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_CHAT = 8;

CODIFIED_INFRASTRUCTURE: 31

Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_CODIFIED_INFRASTRUCTURE = 31;

COMPONENT_ANALYSIS_REPORT: 27

Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_COMPONENT_ANALYSIS_REPORT = 27;

CONFIGURATION: 35

Parameters or settings that may be used by other components or services.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_CONFIGURATION = 35;

DISTRIBUTION: 11

Direct or repository download location

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_DISTRIBUTION = 11;

DISTRIBUTION_INTAKE: 20

The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_DISTRIBUTION_INTAKE = 20;

DOCUMENTATION: 9

Documentation, guides, or how-to instructions

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_DOCUMENTATION = 9;

DYNAMIC_ANALYSIS_REPORT: 25

Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_DYNAMIC_ANALYSIS_REPORT = 25;

EVIDENCE: 36

Information used to substantiate a claim.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_EVIDENCE = 36;

EXPLOITABILITY_STATEMENT: 22

A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_EXPLOITABILITY_STATEMENT = 22;

FORMULATION: 37

Describes how a component or service was manufactured or deployed.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_FORMULATION = 37;

ISSUE_TRACKER: 2

Issue or defect tracking system, or an Application Lifecycle Management (ALM) system

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_ISSUE_TRACKER = 2;

LICENSE: 12

The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_LICENSE = 12;

LOG: 34

A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_LOG = 34;

MAILING_LIST: 6

Mailing list or discussion group

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_MAILING_LIST = 6;

MATURITY_REPORT: 28

Report containing a formal assessment of an organization, business unit, or team against a maturity model

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_MATURITY_REPORT = 28;

MODEL_CARD: 32

A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_MODEL_CARD = 32;

OTHER: 0

Use this if no other types accurately describe the purpose of the external reference

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_OTHER = 0;

PENTEST_REPORT: 23

Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_PENTEST_REPORT = 23;

POAM: 33

Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_POAM = 33;

QUALITY_METRICS: 30

Report or system in which quality metrics can be obtained

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_QUALITY_METRICS = 30;

RISK_ASSESSMENT: 19

Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_RISK_ASSESSMENT = 19;

RUNTIME_ANALYSIS_REPORT: 26

Report generated by analyzing the call stack of a running application

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_RUNTIME_ANALYSIS_REPORT = 26;

SECURITY_CONTACT: 15

Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501]) that specifies the records containing DNS Security TXT.

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_SECURITY_CONTACT = 15;

SOCIAL: 7

Social media account

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_SOCIAL = 7;

STATIC_ANALYSIS_REPORT: 24

SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_STATIC_ANALYSIS_REPORT = 24;

SUPPORT: 10

Community or commercial support

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_SUPPORT = 10;

THREAT_MODEL: 17

An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_THREAT_MODEL = 17;

VCS: 1

Version Control System

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_VCS = 1;

VULNERABILITY_ASSERTION: 21

A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_VULNERABILITY_ASSERTION = 21;

WEBSITE: 3

Website

Generated

from enum value: EXTERNAL_REFERENCE_TYPE_WEBSITE = 3;