Overview
VulnTrack supports three complementary frameworks for vulnerability assessment: CVSS, DREAD, and STRIDE. Each framework serves a different purpose and provides unique insights into security vulnerabilities. Understanding when and how to use each framework helps teams build a comprehensive security program.Framework Comparison Matrix
| Aspect | CVSS | DREAD | STRIDE |
|---|---|---|---|
| Purpose | Technical severity scoring | Risk assessment | Threat categorization |
| Output | Numeric score (0-10) | Numeric score (1-10) | Boolean categories |
| Focus | Vulnerability characteristics | Business impact | Threat types |
| Origin | Industry standard (FIRST) | Microsoft | Microsoft |
| Best For | Compliance, reporting | Prioritization | Threat modeling |
| Audience | Security teams, auditors | Business stakeholders | Development teams |
| Objectivity | High (standardized) | Medium (contextual) | Low (qualitative) |
| Complexity | High | Medium | Low |
Detailed Comparison
CVSS - Industry Standard Scoring
CVSS - Industry Standard Scoring
Strengths
- Industry Standard: Widely recognized and required for compliance
- Objective: Consistent scoring based on technical characteristics
- Comprehensive: Covers exploitability, scope, and impact metrics
- Comparable: Enables comparison across different vulnerabilities and organizations
- Integration: Works with CVE database and security tools
Weaknesses
- Complex: Requires understanding of multiple metrics
- Generic: Doesn’t account for organization-specific context
- Technical: Difficult for non-technical stakeholders to interpret
- Static: Score doesn’t change based on your environment
Use When
- Reporting to external stakeholders or auditors
- Meeting compliance requirements (PCI-DSS, ISO 27001)
- Comparing vulnerabilities across different systems
- Integrating with security tools and scanners
- Tracking publicly disclosed vulnerabilities (CVEs)
Example Use Case
DREAD - Business Risk Assessment
DREAD - Business Risk Assessment
Strengths
- Business-Oriented: Dimensions align with business concerns
- Contextual: Accounts for your specific environment and user base
- Intuitive: Easy for non-technical stakeholders to understand
- Flexible: Can be adapted to organizational priorities
- Comprehensive: Considers multiple risk dimensions
Weaknesses
- Subjective: Scoring can vary between assessors
- Non-Standard: Not universally recognized like CVSS
- Requires Calibration: Teams need to align on scoring methodology
- Time-Intensive: Manual assessment for each dimension
Use When
- Prioritizing remediation efforts internally
- Communicating risk to business stakeholders
- Assessing internal or proprietary vulnerabilities
- Making resource allocation decisions
- Your environment differs significantly from standard assumptions
Example Use Case
STRIDE - Threat Classification
STRIDE - Threat Classification
Strengths
- Structured: Systematic approach to threat identification
- Comprehensive: Covers all major threat categories
- Educational: Helps developers think like attackers
- Design-Focused: Best used during architecture and design phases
- Multi-Threat: Identifies when vulnerabilities span multiple categories
Weaknesses
- No Scoring: Doesn’t provide quantitative risk assessment
- Qualitative: Can’t easily compare severity between threats
- Requires Expertise: Effective use requires security knowledge
- Time-Consuming: Thorough analysis takes significant effort
Use When
- Conducting threat modeling sessions
- Designing new features or systems
- Training developers on security concepts
- Performing security architecture reviews
- Categorizing vulnerabilities for mitigation planning
Example Use Case
Framework Selection Guide
Use CVSS For
- Regulatory compliance
- CVE tracking
- External reporting
- Tool integration
- Vendor communication
Use DREAD For
- Internal prioritization
- Business risk assessment
- Resource planning
- Executive reporting
- Context-specific scoring
Use STRIDE For
- Threat modeling
- Design reviews
- Security training
- Attack surface analysis
- Mitigation planning
Use All Three For
- Comprehensive assessment
- Critical systems
- Security incidents
- Major features
- High-risk vulnerabilities
Multi-Framework Workflow
VulnTrack enables teams to apply multiple frameworks to the same vulnerability:Step-by-Step Workflow
- Discovery: Vulnerability is identified during code review or penetration testing
-
STRIDE Analysis: Categorize the threat types to understand full impact
-
CVSS Scoring: Calculate technical severity for compliance and reporting
-
DREAD Assessment: Evaluate business risk in your specific context
-
Prioritization: Combine all insights to make informed decisions
-
Mitigation: Use STRIDE categories to ensure comprehensive fixes
Real-World Example: Critical Vulnerability Assessment
Let’s assess a critical authentication bypass vulnerability:Scenario
A vulnerability allows attackers to bypass authentication by manipulating JWT tokens.CVSS Assessment
DREAD Assessment
STRIDE Assessment
Combined Decision
Best Practices for Multi-Framework Assessment
- Start with STRIDE: Use during design to identify threats early
- Add CVSS: Calculate standard severity for known vulnerabilities
- Apply DREAD: Assess business impact in your specific context
- Cross-Validate: If frameworks disagree significantly, investigate why
- Document Rationale: Always explain scoring decisions for future reference
- Regular Calibration: Periodically review with team to ensure consistency
- Automate Where Possible: Use VulnTrack’s CVSS-to-DREAD mapping to save time
Automatic CVSS-to-DREAD Mapping
VulnTrack can automatically generate DREAD scores from CVSS vectors:Decision Matrix: Which Framework to Use?
| Situation | Recommended Framework(s) |
|---|---|
| New feature design | STRIDE |
| External penetration test findings | CVSS + DREAD |
| Internal security review | DREAD + STRIDE |
| Compliance audit | CVSS |
| Public CVE tracking | CVSS |
| Executive risk report | DREAD |
| Developer training | STRIDE |
| Remediation prioritization | CVSS + DREAD |
| Critical vulnerability | All three |
| Weekly security review | DREAD |
Framework Resources
CVSS Details
Learn about CVSS v3.1 metrics and scoring
DREAD Details
Understand DREAD risk assessment
STRIDE Details
Explore STRIDE threat modeling
Conclusion
No single framework provides a complete picture of vulnerability risk. VulnTrack’s support for CVSS, DREAD, and STRIDE enables teams to:- Comply with industry standards (CVSS)
- Prioritize based on business impact (DREAD)
- Understand threat types comprehensively (STRIDE)