Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SVG:RAT"

From EGIWiki
Jump to navigation Jump to search
 
Line 4: Line 4:


The RAT follows the process defined in the   
The RAT follows the process defined in the   
* [https://documents.egi.eu/document/3147 EGI Software Vulnerability Issue Handling Process ] and summarized in [[SVG:Issue Handling Summary |  issue handling  summary]]  
* [https://documents.egi.eu/document/3145 EGI Software Vulnerability Issue Handling Process ] and summarized in [[SVG:Issue Handling Summary |  issue handling  summary]]  


The RAT members are mainly drawn from the Software providers, whose middleware is released as part of the EGI UMD and security experts from the CSIRT Team.  
The RAT members are mainly drawn from the Software providers, whose middleware is released as part of the EGI UMD and security experts from the CSIRT Team.  

Latest revision as of 15:09, 13 May 2020

Main page Software Security Checklist Issue Handling Advisories Notes On Risk Advisory Template More

RAT


The EGI SVG Risk Assessment Team or "RAT" is the group of people who carry out most of the work to investigate and assess vulnerabilities reported to the EGI Software Vulnerability Issue handling process. In future, the Deployment Expert Group (DEG) will assist in this process.

The RAT follows the process defined in the

The RAT members are mainly drawn from the Software providers, whose middleware is released as part of the EGI UMD and security experts from the CSIRT Team.

A list of RAT Members is available.

Other SVG Membership

Other people are members of the SVG, who are interested and are members of EGI or a collaborative project. These SVG members don't actually carry out the issue handling, but carry out other functions such as general discussions, advice on Secure Coding and Vulnerability Assessment .