diff --git a/.gitignore b/.gitignore
index b6e47617..96a61d5e 100644
--- a/.gitignore
+++ b/.gitignore
@@ -127,3 +127,4 @@ dmypy.json
# Pyre type checker
.pyre/
+ssvc2-applier-wip.xlsx
diff --git a/data/ssvc_2_deployer.csv b/data/ssvc_2_deployer.csv
new file mode 100644
index 00000000..1114624b
--- /dev/null
+++ b/data/ssvc_2_deployer.csv
@@ -0,0 +1,145 @@
+Exploitation,Exposure,MissionImpact,SafetyImpact,SafetyMissionImpact,Outcome
+none,small,none/degraded,none/minor,low,defer
+none,small,none/degraded,major,medium,scheduled
+none,small,none/degraded,hazardous,high,scheduled
+none,small,none/degraded,catastrophic,very high,out-of-cycle
+none,small,MEF crippled,none/minor,low,scheduled
+none,small,MEF crippled,major,medium,scheduled
+none,small,MEF crippled,hazardous,high,scheduled
+none,small,MEF crippled,catastrophic,very high,out-of-cycle
+none,small,MEF fail,none/minor,medium,scheduled
+none,small,MEF fail,major,high,scheduled
+none,small,MEF fail,hazardous,high,scheduled
+none,small,MEF fail,catastrophic,very high,out-of-cycle
+none,small,mission fail,none/minor,very high,scheduled
+none,small,mission fail,major,very high,scheduled
+none,small,mission fail,hazardous,very high,scheduled
+none,small,mission fail,catastrophic,very high,out-of-cycle
+none,controlled,none/degraded,none/minor,low,defer
+none,controlled,none/degraded,major,medium,scheduled
+none,controlled,none/degraded,hazardous,high,out-of-cycle
+none,controlled,none/degraded,catastrophic,very high,out-of-cycle
+none,controlled,MEF crippled,none/minor,low,scheduled
+none,controlled,MEF crippled,major,medium,scheduled
+none,controlled,MEF crippled,hazardous,high,out-of-cycle
+none,controlled,MEF crippled,catastrophic,very high,out-of-cycle
+none,controlled,MEF fail,none/minor,medium,scheduled
+none,controlled,MEF fail,major,high,scheduled
+none,controlled,MEF fail,hazardous,high,out-of-cycle
+none,controlled,MEF fail,catastrophic,very high,out-of-cycle
+none,controlled,mission fail,none/minor,very high,out-of-cycle
+none,controlled,mission fail,major,very high,out-of-cycle
+none,controlled,mission fail,hazardous,very high,out-of-cycle
+none,controlled,mission fail,catastrophic,very high,out-of-cycle
+none,open,none/degraded,none/minor,low,scheduled
+none,open,none/degraded,major,medium,scheduled
+none,open,none/degraded,hazardous,high,out-of-cycle
+none,open,none/degraded,catastrophic,very high,immediate
+none,open,MEF crippled,none/minor,low,scheduled
+none,open,MEF crippled,major,medium,scheduled
+none,open,MEF crippled,hazardous,high,out-of-cycle
+none,open,MEF crippled,catastrophic,very high,immediate
+none,open,MEF fail,none/minor,medium,scheduled
+none,open,MEF fail,major,high,out-of-cycle
+none,open,MEF fail,hazardous,high,out-of-cycle
+none,open,MEF fail,catastrophic,very high,immediate
+none,open,mission fail,none/minor,very high,out-of-cycle
+none,open,mission fail,major,very high,out-of-cycle
+none,open,mission fail,hazardous,very high,out-of-cycle
+none,open,mission fail,catastrophic,very high,immediate
+poc,small,none/degraded,none/minor,low,defer
+poc,small,none/degraded,major,medium,scheduled
+poc,small,none/degraded,hazardous,high,scheduled
+poc,small,none/degraded,catastrophic,very high,out-of-cycle
+poc,small,MEF crippled,none/minor,low,scheduled
+poc,small,MEF crippled,major,medium,scheduled
+poc,small,MEF crippled,hazardous,high,out-of-cycle
+poc,small,MEF crippled,catastrophic,very high,out-of-cycle
+poc,small,MEF fail,none/minor,medium,scheduled
+poc,small,MEF fail,major,high,scheduled
+poc,small,MEF fail,hazardous,high,out-of-cycle
+poc,small,MEF fail,catastrophic,very high,immediate
+poc,small,mission fail,none/minor,very high,scheduled
+poc,small,mission fail,major,very high,out-of-cycle
+poc,small,mission fail,hazardous,very high,out-of-cycle
+poc,small,mission fail,catastrophic,very high,immediate
+poc,controlled,none/degraded,none/minor,low,scheduled
+poc,controlled,none/degraded,major,medium,scheduled
+poc,controlled,none/degraded,hazardous,high,out-of-cycle
+poc,controlled,none/degraded,catastrophic,very high,immediate
+poc,controlled,MEF crippled,none/minor,low,scheduled
+poc,controlled,MEF crippled,major,medium,scheduled
+poc,controlled,MEF crippled,hazardous,high,out-of-cycle
+poc,controlled,MEF crippled,catastrophic,very high,immediate
+poc,controlled,MEF fail,none/minor,medium,scheduled
+poc,controlled,MEF fail,major,high,out-of-cycle
+poc,controlled,MEF fail,hazardous,high,out-of-cycle
+poc,controlled,MEF fail,catastrophic,very high,immediate
+poc,controlled,mission fail,none/minor,very high,immediate
+poc,controlled,mission fail,major,very high,immediate
+poc,controlled,mission fail,hazardous,very high,immediate
+poc,controlled,mission fail,catastrophic,very high,immediate
+poc,open,none/degraded,none/minor,low,scheduled
+poc,open,none/degraded,major,medium,out-of-cycle
+poc,open,none/degraded,hazardous,high,out-of-cycle
+poc,open,none/degraded,catastrophic,very high,immediate
+poc,open,MEF crippled,none/minor,low,scheduled
+poc,open,MEF crippled,major,medium,out-of-cycle
+poc,open,MEF crippled,hazardous,high,out-of-cycle
+poc,open,MEF crippled,catastrophic,very high,immediate
+poc,open,MEF fail,none/minor,medium,out-of-cycle
+poc,open,MEF fail,major,high,out-of-cycle
+poc,open,MEF fail,hazardous,high,out-of-cycle
+poc,open,MEF fail,catastrophic,very high,immediate
+poc,open,mission fail,none/minor,very high,immediate
+poc,open,mission fail,major,very high,immediate
+poc,open,mission fail,hazardous,very high,immediate
+poc,open,mission fail,catastrophic,very high,immediate
+active,small,none/degraded,none/minor,low,scheduled
+active,small,none/degraded,major,medium,scheduled
+active,small,none/degraded,hazardous,high,out-of-cycle
+active,small,none/degraded,catastrophic,very high,immediate
+active,small,MEF crippled,none/minor,low,scheduled
+active,small,MEF crippled,major,medium,scheduled
+active,small,MEF crippled,hazardous,high,out-of-cycle
+active,small,MEF crippled,catastrophic,very high,immediate
+active,small,MEF fail,none/minor,medium,scheduled
+active,small,MEF fail,major,high,out-of-cycle
+active,small,MEF fail,hazardous,high,out-of-cycle
+active,small,MEF fail,catastrophic,very high,immediate
+active,small,mission fail,none/minor,very high,out-of-cycle
+active,small,mission fail,major,very high,out-of-cycle
+active,small,mission fail,hazardous,very high,immediate
+active,small,mission fail,catastrophic,very high,immediate
+active,controlled,none/degraded,none/minor,low,scheduled
+active,controlled,none/degraded,major,medium,out-of-cycle
+active,controlled,none/degraded,hazardous,high,out-of-cycle
+active,controlled,none/degraded,catastrophic,very high,immediate
+active,controlled,MEF crippled,none/minor,low,scheduled
+active,controlled,MEF crippled,major,medium,out-of-cycle
+active,controlled,MEF crippled,hazardous,high,out-of-cycle
+active,controlled,MEF crippled,catastrophic,very high,immediate
+active,controlled,MEF fail,none/minor,medium,out-of-cycle
+active,controlled,MEF fail,major,high,out-of-cycle
+active,controlled,MEF fail,hazardous,high,immediate
+active,controlled,MEF fail,catastrophic,very high,immediate
+active,controlled,mission fail,none/minor,very high,immediate
+active,controlled,mission fail,major,very high,immediate
+active,controlled,mission fail,hazardous,very high,immediate
+active,controlled,mission fail,catastrophic,very high,immediate
+active,open,none/degraded,none/minor,low,out-of-cycle
+active,open,none/degraded,major,medium,out-of-cycle
+active,open,none/degraded,hazardous,high,immediate
+active,open,none/degraded,catastrophic,very high,immediate
+active,open,MEF crippled,none/minor,low,out-of-cycle
+active,open,MEF crippled,major,medium,out-of-cycle
+active,open,MEF crippled,hazardous,high,immediate
+active,open,MEF crippled,catastrophic,very high,immediate
+active,open,MEF fail,none/minor,medium,immediate
+active,open,MEF fail,major,high,immediate
+active,open,MEF fail,hazardous,high,immediate
+active,open,MEF fail,catastrophic,very high,immediate
+active,open,mission fail,none/minor,very high,immediate
+active,open,mission fail,major,very high,immediate
+active,open,mission fail,hazardous,very high,immediate
+active,open,mission fail,catastrophic,very high,immediate
diff --git a/data/ssvc_2_deployer_simplified.csv b/data/ssvc_2_deployer_simplified.csv
new file mode 100644
index 00000000..1b2d7614
--- /dev/null
+++ b/data/ssvc_2_deployer_simplified.csv
@@ -0,0 +1,37 @@
+Exploitation,Exposure,SafetyMissionImpact,Outcome
+none,small,low,scheduled
+none,small,medium,scheduled
+none,small,high,scheduled
+none,small,very high,out-of-cycle
+none,controlled,low,scheduled
+none,controlled,medium,scheduled
+none,controlled,high,out-of-cycle
+none,controlled,very high,out-of-cycle
+none,open,low,scheduled
+none,open,medium,scheduled
+none,open,high,out-of-cycle
+none,open,very high,immediate
+poc,small,low,scheduled
+poc,small,medium,scheduled
+poc,small,high,out-of-cycle
+poc,small,very high,immediate
+poc,controlled,low,scheduled
+poc,controlled,medium,scheduled
+poc,controlled,high,out-of-cycle
+poc,controlled,very high,immediate
+poc,open,low,scheduled
+poc,open,medium,out-of-cycle
+poc,open,high,out-of-cycle
+poc,open,very high,immediate
+active,small,low,scheduled
+active,small,medium,scheduled
+active,small,high,out-of-cycle
+active,small,very high,immediate
+active,controlled,low,scheduled
+active,controlled,medium,out-of-cycle
+active,controlled,high,immediate
+active,controlled,very high,immediate
+active,open,low,out-of-cycle
+active,open,medium,immediate
+active,open,high,immediate
+active,open,very high,immediate
diff --git a/data/ssvc_2_supplier.csv b/data/ssvc_2_supplier.csv
new file mode 100644
index 00000000..6989f617
--- /dev/null
+++ b/data/ssvc_2_supplier.csv
@@ -0,0 +1,104 @@
+Exploitation,Automatability,Value,Utility,TechnicalImpact,SafetyImpact,PublicSafetyImpact,Outcome
+none,slow,diffuse,laborious,partial,none/minor,minimal,defer
+none,slow,diffuse,laborious,partial,major,significant,scheduled
+none,slow,diffuse,laborious,partial,hazardous,significant,scheduled
+none,slow,diffuse,laborious,partial,catastrophic,significant,scheduled
+none,slow,diffuse,laborious,total,none/minor,minimal,defer
+none,slow,diffuse,laborious,total,major,significant,scheduled
+none,slow,diffuse,laborious,total,hazardous,significant,scheduled
+none,slow,diffuse,laborious,total,catastrophic,significant,out-of-cycle
+none,slow,concentrated,efficient,partial,none/minor,minimal,defer
+none,rapid,diffuse,efficient,partial,none/minor,minimal,defer
+none,slow,concentrated,efficient,partial,none/minor,minimal,scheduled
+none,rapid,diffuse,efficient,partial,none/minor,minimal,scheduled
+none,slow,concentrated,efficient,partial,major,significant,scheduled
+none,rapid,diffuse,efficient,partial,major,significant,scheduled
+none,slow,concentrated,efficient,partial,hazardous,significant,scheduled
+none,rapid,diffuse,efficient,partial,hazardous,significant,scheduled
+none,slow,concentrated,efficient,partial,catastrophic,significant,out-of-cycle
+none,rapid,diffuse,efficient,partial,catastrophic,significant,out-of-cycle
+none,slow,concentrated,efficient,total,none/minor,minimal,scheduled
+none,rapid,diffuse,efficient,total,none/minor,minimal,scheduled
+none,slow,concentrated,efficient,total,major,significant,scheduled
+none,rapid,diffuse,efficient,total,major,significant,scheduled
+none,slow,concentrated,efficient,total,hazardous,significant,out-of-cycle
+none,rapid,diffuse,efficient,total,hazardous,significant,out-of-cycle
+none,slow,concentrated,efficient,total,catastrophic,significant,out-of-cycle
+none,rapid,diffuse,efficient,total,catastrophic,significant,out-of-cycle
+none,rapid,concentrated,super effective,partial,none/minor,minimal,scheduled
+none,rapid,concentrated,super effective,partial,major,significant,scheduled
+none,rapid,concentrated,super effective,partial,hazardous,significant,out-of-cycle
+none,rapid,concentrated,super effective,partial,catastrophic,significant,out-of-cycle
+none,rapid,concentrated,super effective,total,none/minor,minimal,scheduled
+none,rapid,concentrated,super effective,total,major,significant,scheduled
+none,rapid,concentrated,super effective,total,hazardous,significant,out-of-cycle
+none,rapid,concentrated,super effective,total,catastrophic,significant,out-of-cycle
+poc,slow,diffuse,laborious,partial,none/minor,minimal,scheduled
+poc,slow,diffuse,laborious,partial,major,significant,out-of-cycle
+poc,slow,diffuse,laborious,partial,hazardous,significant,out-of-cycle
+poc,slow,diffuse,laborious,partial,catastrophic,significant,out-of-cycle
+poc,slow,diffuse,laborious,total,none/minor,minimal,scheduled
+poc,slow,diffuse,laborious,total,major,significant,out-of-cycle
+poc,slow,diffuse,laborious,total,hazardous,significant,out-of-cycle
+poc,slow,diffuse,laborious,total,catastrophic,significant,immediate
+poc,slow,concentrated,efficient,partial,none/minor,minimal,scheduled
+poc,rapid,diffuse,efficient,partial,none/minor,minimal,scheduled
+poc,slow,concentrated,efficient,partial,major,significant,out-of-cycle
+poc,rapid,diffuse,efficient,partial,major,significant,out-of-cycle
+poc,slow,concentrated,efficient,partial,hazardous,significant,immediate
+poc,rapid,diffuse,efficient,partial,hazardous,significant,immediate
+poc,slow,concentrated,efficient,partial,catastrophic,significant,immediate
+poc,rapid,diffuse,efficient,partial,catastrophic,significant,immediate
+poc,slow,concentrated,efficient,total,none/minor,minimal,scheduled
+poc,rapid,diffuse,efficient,total,none/minor,minimal,scheduled
+poc,slow,concentrated,efficient,total,none/minor,minimal,out-of-cycle
+poc,rapid,diffuse,efficient,total,none/minor,minimal,out-of-cycle
+poc,slow,concentrated,efficient,total,major,significant,out-of-cycle
+poc,rapid,diffuse,efficient,total,major,significant,out-of-cycle
+poc,slow,concentrated,efficient,total,hazardous,significant,immediate
+poc,rapid,diffuse,efficient,total,hazardous,significant,immediate
+poc,slow,concentrated,efficient,total,catastrophic,significant,immediate
+poc,rapid,diffuse,efficient,total,catastrophic,significant,immediate
+poc,rapid,concentrated,super effective,partial,none/minor,minimal,scheduled
+poc,rapid,concentrated,super effective,partial,none/minor,minimal,out-of-cycle
+poc,rapid,concentrated,super effective,partial,major,significant,out-of-cycle
+poc,rapid,concentrated,super effective,partial,hazardous,significant,immediate
+poc,rapid,concentrated,super effective,partial,catastrophic,significant,immediate
+poc,rapid,concentrated,super effective,total,none/minor,minimal,out-of-cycle
+poc,rapid,concentrated,super effective,total,major,significant,out-of-cycle
+poc,rapid,concentrated,super effective,total,hazardous,significant,immediate
+poc,rapid,concentrated,super effective,total,catastrophic,significant,immediate
+active,slow,diffuse,laborious,partial,none/minor,minimal,scheduled
+active,slow,diffuse,laborious,partial,none/minor,minimal,out-of-cycle
+active,slow,diffuse,laborious,partial,major,significant,out-of-cycle
+active,slow,diffuse,laborious,partial,hazardous,significant,immediate
+active,slow,diffuse,laborious,partial,catastrophic,significant,immediate
+active,slow,diffuse,laborious,total,none/minor,minimal,out-of-cycle
+active,slow,diffuse,laborious,total,major,significant,out-of-cycle
+active,slow,diffuse,laborious,total,hazardous,significant,immediate
+active,slow,diffuse,laborious,total,catastrophic,significant,immediate
+active,slow,concentrated,efficient,partial,none/minor,minimal,out-of-cycle
+active,rapid,diffuse,efficient,partial,none/minor,minimal,out-of-cycle
+active,slow,concentrated,efficient,partial,major,significant,immediate
+active,rapid,diffuse,efficient,partial,major,significant,immediate
+active,slow,concentrated,efficient,partial,hazardous,significant,immediate
+active,rapid,diffuse,efficient,partial,hazardous,significant,immediate
+active,slow,concentrated,efficient,partial,catastrophic,significant,immediate
+active,rapid,diffuse,efficient,partial,catastrophic,significant,immediate
+active,slow,concentrated,efficient,total,none/minor,minimal,out-of-cycle
+active,rapid,diffuse,efficient,total,none/minor,minimal,out-of-cycle
+active,slow,concentrated,efficient,total,major,significant,immediate
+active,rapid,diffuse,efficient,total,major,significant,immediate
+active,slow,concentrated,efficient,total,hazardous,significant,immediate
+active,rapid,diffuse,efficient,total,hazardous,significant,immediate
+active,slow,concentrated,efficient,total,catastrophic,significant,immediate
+active,rapid,diffuse,efficient,total,catastrophic,significant,immediate
+active,rapid,concentrated,super effective,partial,none/minor,minimal,out-of-cycle
+active,rapid,concentrated,super effective,partial,none/minor,minimal,immediate
+active,rapid,concentrated,super effective,partial,major,significant,immediate
+active,rapid,concentrated,super effective,partial,hazardous,significant,immediate
+active,rapid,concentrated,super effective,partial,catastrophic,significant,immediate
+active,rapid,concentrated,super effective,total,none/minor,minimal,immediate
+active,rapid,concentrated,super effective,total,major,significant,immediate
+active,rapid,concentrated,super effective,total,hazardous,significant,immediate
+active,rapid,concentrated,super effective,total,catastrophic,significant,immediate
diff --git a/data/ssvc_2_supplier_simplified.csv b/data/ssvc_2_supplier_simplified.csv
new file mode 100644
index 00000000..e2fa9a49
--- /dev/null
+++ b/data/ssvc_2_supplier_simplified.csv
@@ -0,0 +1,37 @@
+Exploitation,Utility,TechnicalImpact,PublicSafetyImpact,Outcome
+none,laborious,partial,minimal,defer
+none,laborious,partial,significant,scheduled
+none,laborious,total,minimal,defer
+none,laborious,total,significant,out-of-cycle
+none,efficient,partial,minimal,scheduled
+none,efficient,partial,significant,out-of-cycle
+none,efficient,total,minimal,scheduled
+none,efficient,total,significant,out-of-cycle
+none,super effective,partial,minimal,scheduled
+none,super effective,partial,significant,out-of-cycle
+none,super effective,total,minimal,scheduled
+none,super effective,total,significant,out-of-cycle
+poc,laborious,partial,minimal,scheduled
+poc,laborious,partial,significant,out-of-cycle
+poc,laborious,total,minimal,scheduled
+poc,laborious,total,significant,immediate
+poc,efficient,partial,minimal,scheduled
+poc,efficient,partial,significant,immediate
+poc,efficient,total,minimal,out-of-cycle
+poc,efficient,total,significant,immediate
+poc,super effective,partial,minimal,out-of-cycle
+poc,super effective,partial,significant,immediate
+poc,super effective,total,minimal,out-of-cycle
+poc,super effective,total,significant,immediate
+active,laborious,partial,minimal,out-of-cycle
+active,laborious,partial,significant,immediate
+active,laborious,total,minimal,out-of-cycle
+active,laborious,total,significant,immediate
+active,efficient,partial,minimal,out-of-cycle
+active,efficient,partial,significant,immediate
+active,efficient,total,minimal,out-of-cycle
+active,efficient,total,significant,immediate
+active,super effective,partial,minimal,immediate
+active,super effective,partial,significant,immediate
+active,super effective,total,minimal,immediate
+active,super effective,total,significant,immediate
diff --git a/doc/version_1/040_treesForVulMgmt.md b/doc/version_1/040_treesForVulMgmt.md
index 45791ca0..a25d4706 100644
--- a/doc/version_1/040_treesForVulMgmt.md
+++ b/doc/version_1/040_treesForVulMgmt.md
@@ -63,9 +63,26 @@ affect the results.
Returning to the example of an organization with three vulnerabilities to patch that were assigned *scheduled* priority, in SSVC, they can be patched in any order. This is an improvement over CVSS, since based on the scoring errors, CVSS was essentially just giving random fine-grained priorities within qualitative categories anyway. With our system, organizations can be more deliberate about conveniently organizing work that is of equivalent priority.
+### Risk Tolerance and Response Priority
+
+For any vulnerability management practice to succeed it must balance at least two risks:
+
+1. Change risk: the potential costs of deploying fixes, which include testing and deployment in addition to any problems that could arise from making changes to production systems.
+2. Vulnerability risk: the potential costs of incidents resulting from exploitation of vulnerable systems
+
+To place these risks in context, we follow the SEI's Taxonomy of Operational Cyber Security Risks [@cebula2010taxonomy]. Change risk can be characterized as a combination of Class 2 and/or Class 3 risks. Class 2: Systems and Technology Failures includes hardware, software, and systems risks. Class 3: Failed Internal Processes can arise from process design, process execution, process controls, or supporting processes. Meanwhile, vulnerability risk falls into Subclass 1.2: Actions of People: Deliberate.
+
+In developing the decision trees in this document, we had in mind stakeholders with a moderate tolerance for risk. The resulting trees reflect that assumption. Organizations may of course be more or less conservative in their own vulnerability management practices, and we cannot presume to determine how an organization should balance their risk.
+
+We therefore remind our readers that the labels on the trees (defer, immediate, etc.) can and should be customized to suit the needs of individual stakeholders wherever necessary and appropriate. For example, an organization with a high aversion to change risk might choose to accept more vulnerability risk by lowering the overall response labels for many branches in the trees, resulting in fewer vulnerabilities attaining the most urgent response. On the other hand, an organization with a high aversion to vulnerability risk could elevate the priority of many branches to ensure fixes are deployed quickly.
+
## Scope
-One important variable in the answers to all the below decision points is scope. There are at least two aspects to scope. One is how the boundaries of the affected system are set. A second is how far forward in time or causal steps one reasons about effects and harms. We put forward recommendations for both of these. However, users of the decision process may want to define different scopes. Users may define a different scope as long as the scope is consistent across decisions, and are credible, explicit, and accessible to all relevant decision makers.
+One important variable in the answers to all the below decision points is scope. There are at least two aspects to scope. One is how the boundaries of the affected system are set. A second is how far forward in time or causal steps one reasons about effects and harms. We put forward recommendations for both of these.
+
+However, users of the decision process may want to define different scopes. Users may define a different scope as long as the scope is consistent across decisions, and are credible, explicit, and accessible to all relevant decision makers.
+
+For example, suppliers often decline to support products beyond a declared end-of-life (EOL) date. In those cases, a supplier could reasonably consider vulnerabilities in those products to be out of scope. However, a deployer may still have active instances of EOL products in their infrastructure. It remains appropriate for a deployer to use SSVC to prioritize their response to such situations, since even if there is no fix forthcoming from the supplier it may be possible for the deployer to mitigate or remediate the vulnerability in other ways, up to and including decommissioning the affected system(s).
### Boundaries of the Affected System
@@ -88,388 +105,3 @@ Products, libraries, and applications tend to be appropriate objects of focus wh
### Reasoning Steps Forward
This aspect of scope is about immediacy, prevalence, and causal importance. Immediacy is about how soon after the decision point adverse effects should occur to be considered relevant. Prevalence is about how common adverse effects should be to be considered relevant. Causal importance is about how much an exploitation of the software in the cyber-physical system contributes to adverse effects to be considered relevant. Our recommendation is to walk a pragmatic middle path on all three aspects. Effects are not relevant if they are merely possible, too infrequent, far distant, or unchanged by the vulnerability. But effects are relevant long before they are absolutely certain, ubiquitous, or occurring presently. Overall, we summarize this aspect of scope as *consider credible effects based on known use cases of the software system as a part of cyber-physical systems*.
-
-## Likely Decision Points and Relevant Data
-
-We propose the following decision points and associated values should be a factor when making decisions about vulnerability prioritization. Each decision point is tagged with the stakeholder it is relevant to: deployers, suppliers, or both. We emphasize that these descriptions are hypotheses to be further tested and validated. We made every effort to put forward informed and useful decision frameworks with wide applicability, but the goal of this paper is more to solicit feedback than make a declaration. We welcome questions, constructive criticism, refuting evidence, or supporting evidence about any aspect of this proposal.
-
-One important omission from the values for each category is an “unknown” option. Instead, we recommend explicitly identifying an option that is a reasonable assumption based on prior events. Such an option requires reliable historical evidence for what tends to be the case; of course, future events may require changes to these assumptions over time. Therefore, our assumptions require evidence and are open to debate in light of new evidence. Different risk tolerance or risk discounting postures are not addressed in the current work; accommodating such tolerance or discounting explicitly is an area for future work. This flexibility fits into our overall goal of supplying a decision-making framework that is both transparent and fits the needs of different communities. Resisting an “unknown” option discourages the modeler from silently embedding these assumptions in their choices for how the decision tree flows below the selection of any “unknown” option.
-
-We propose satisfactory decision points for vulnerability management in the next sections, in no particular order.
-
-### Exploitation (Supplier, Deployer)
-> Evidence of Active Exploitation of a Vulnerability
-
-The intent of this measure is the present state of exploitation of the vulnerability. The intent is not to predict future exploitation but only to acknowledge the current state of affairs. Predictive systems, such as EPSS, could be used to augment this decision or to notify stakeholders of likely changes [@jacobs2019exploit].
-
-| | Table 4: Exploitation Decision Values |
-| --- | --------------------------------- |
-| None | There is no evidence of active exploitation and no public proof of concept (PoC) of how to exploit the vulnerability. |
-| PoC
(Proof of Concept) | One of the following cases is true: (1) exploit code sold or traded on underground or restricted fora; (2) typical public PoC in places such as Metasploit or ExploitDB; or (3) the vulnerability has a well-known method of exploitation. Some examples of condition (3) are open-source web proxies serve as the PoC code for how to exploit any vulnerability in the vein of improper validation of TLS certificates. As another example, Wireshark serves as a PoC for packet replay attacks on ethernet or WiFi networks. |
-| Active | Shared, observable, reliable evidence that the exploit is being used in the wild by real attackers; there is credible public reporting. |
-
-### Technical Impact (Supplier)
-> Technical Impact of Exploiting the Vulnerability
-
-When evaluating *technical impact*, recall the scope definition above. Total control is relative to the affected component where the vulnerability resides. If a vulnerability discloses authentication or authorization credentials to the system, this information disclosure should also be scored as “total” if those credentials give an adversary total control of the component.
-
-
-
-| | Table 5: Technical Impact Decision Values |
-| ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
-| Partial | The exploit gives the adversary *limited* control over, or information exposure about, the behavior of the software that contains the vulnerability. Or the exploit gives the adversary an importantly low stochastic opportunity for total control. In this context, “low” means that the attacker cannot reasonably make enough attempts to overcome the low chance of each attempt not working. Denial of service is a form of limited control over the behavior of the vulnerable component. |
-| Total | The exploit gives the adversary *total* control over the behavior of the software, or it gives total disclosure of all information on the system that contains the vulnerability |
-
-### Utility (Supplier, Deployer)
-> The Usefulness of the Exploit to the Adversary
-
-Heuristically, we base *utility* on a combination of value density of vulnerable components and automatability of potential exploitation. This framing makes it easier to analytically derive these categories from a description of the vulnerability and the affected component. Automatability (slow or rapid) and value density (diffuse or concentrated) are defined in Sections 4.4.3.1 and 4.4.3.2. Deployers currently use this feature only as a suggested constraint on the values for *Mission Impact*.
-main
-
-Roughly, *utility* is a combination of two things: (1) the value of each exploitation event and (2) the ease and speed with which the adversary can cause exploitation events. We define *utility* as laborious, efficient, or super effective, as described in Table 6.
-
-| | Table 6: Utility Decision Values |
-| --------------- | ------------------------------------------------------------------------------ |
-| Laborious | Slow automatability and diffuse value |
-| Efficient | {Rapid automatability and diffuse value} OR {Slow automatability and concentrated value} |
-| Super Effective | Rapid automatability and concentrated value |
-
-#### Automatability
-
-*Automatability* is described as slow or rapid:
-
- - **Slow**. Attackers cannot reliably automate steps 1-4 of the kill chain
- [@hutchins2011intelligence] for this vulnerability for some reason. These
- steps are reconnaissance, weaponization, delivery, and exploitation. Example
- reasons for why a step may not be reliably automatable include (1)
- the vulnerable component is not searchable or enumerable on the
- network, (2) weaponization may require human direction for each
- target, (3) delivery may require channels that widely deployed
- network security configurations block, and (3) exploitation may be
- frustrated by adequate exploit-prevention techniques enabled by
- default; ASLR is an example of an exploit-prevention tool.
-
- - **Rapid**. Attackers can reliably automate steps 1-4 of the of the kill
- chain. If the vulnerability allows remote code execution or command
- injection, the default response should be rapid.
-
-#### Value Density
-
-*Value density* is described as diffuse or concentrated:
-
- - **Diffuse**. The system that contains the vulnerable component has
- limited resources. That is, the resources that the adversary will
- gain control over with a single exploitation event are relatively
- small. Examples of systems with diffuse value are email accounts,
- most consumer online banking accounts, common cell phones, and most
- personal computing resources owned and maintained by users. (A
- “user” is anyone whose professional task is something other than
- the maintenance of the system or component. As with *safety impact*,
- a “system operator” is anyone who is professionally responsible for
- the proper operation or maintenance of a system.)
-
- - **Concentrated**. The system that contains the vulnerable component
- is rich in resources. Heuristically, such systems are often the
- direct responsibility of “system operators” rather than users.
- Examples of concentrated value are database systems, Kerberos
- servers, web servers hosting login pages, and cloud service
- providers. However, usefulness and uniqueness of the resources on
- the vulnerable system also inform value density. For example,
- encrypted mobile messaging platforms may have concentrated value,
- not because each phone’s messaging history has a particularly large
- amount of data, but because it is uniquely valuable to law
- enforcement.
-
-The output for the *Utility* decision point is visualized in Table 7.
-
-Table 7: Utility to the Adversary, as a Combination of Automatability and Value Density
-
-| *Automatability* | *Value Density* | *Utility* |
-| ----------- | --------------- | --: |
-| **slow** | **diffuse** | laborious |
-| **slow** | **concentrated** | efficient |
-| **rapid** | **diffuse** | efficient |
-| **rapid** | **concentrated** | super effective |
-
-
-Alternative heuristics for proxying adversary utility are plausible. One such example is the value the vulnerability would have were it sold on the open market. Some firms, such as [Zerodium](https://zerodium.com/program.html), make such pricing structures public. The valuable exploits track the automatability and value density heuristics for the most part. Within a single system—whether it is Apache, Windows, iOS or WhatsApp—more automated kill chain steps successfully leads to higher exploit value. Remote code execution with sandbox escape and without user interaction are the most valuable exploits, and those features describe automation of the relevant kill chain steps. How equivalently virulent exploits for different systems are priced relative to each other is more idiosyncratic. Price does not only track value density of the system, but presumably also the existing supply of exploits and the installation distribution among the targets of Zerodium’s customers. Currently, we simplify the analysis and ignore these factors. However, future work should look for and prevent large mismatches between the outputs of the *utility* decision point and the exploit markets.
-
-### Safety Impact (Supplier, Deployer)
-> Safety Impacts of Affected System Compromise
-
-We take an expansive view of safety, in which a safety violation is a violation of what the [Centers for Disease Control (CDC)](https://www.cdc.gov/hrqol/wellbeing.htm#three) calls **well-being**. Physical well-being violations are common safety violations, but we also include economic, social, emotional, and psychological well-being as important. Weighing fine differences among these categories is probably not possible, so we will not try. Each decision option lists examples of the effects that qualify for that value/answer in the various types of violations of well-being. These examples should not be considered comprehensive or exhaustive, but rather as suggestive.
-
-
-The stakeholder should consider the safety impact on the operators (heuristically, by “system operator” we mean those who are professionally
-responsible for the proper operation of the cyber-physical system, as the term is used in the safety analysis literature) and users of the software they provide. If software is repackaged and resold by a stakeholder to further downstream entities who will then sell a product, the initial stakeholder can only reasonably consider so many links in that supply chain. But a stakeholder should know its immediate consumers one step away in the supply chain. Those consumers may repackage or build on the software and then provide that product further on.
-
-We expect that a stakeholder should be aware of common usage of their software about two steps in the supply chain away. This expectation holds in both open source and proprietary contexts. Further steps along the supply chain are probably not reasonable for the stakeholder to consider consistently; however, this is not license to willfully ignore common downstream uses of the stakeholder’s software. If the stakeholder is contractually or legally responsible for safe operation of the software or cyber-physical system of which it is part, that also supersedes our rough supply-chain depth considerations. For software used in a wide variety of sectors and deployments, the stakeholder may need to estimate an aggregate safety impact. Aggregation suggests that the stakeholder’s response to this decision point cannot be less than the most severe credible safety impact, but we leave the specific aggregation method or function as a domain-specific extension for future work.
-
-#### Advice for Gathering Information to Answer the Safety Impact Question
-
-The factors that influence the safety impact level are diverse. This paper does not exhaustively discuss how a stakeholder should answer a question; that is a topic for future work. At a minimum, understanding safety impact should include gathering information about survivability of the vulnerable component, determining available operator actions to compensate for the vulnerable component, understanding relevant insurance, and determining the viability of existing backup measures. Each of these information items depends heavily on domain-specific knowledge, and so it is out of the scope of this paper to give a general-purpose strategy for how they should be included. For example, viable manual backup mechanisms are likely important in assessing the safety impact of an industrial control system in a sewage plant, but in banking the insurance structures that prevent bankruptcies are more important.
-
-The safety impact categories in Table 8 are based on hazard categories for aircraft software [@DO-178C; @faa2000safety, Section 3.3.2].
-
-Table 8: Safety Impact Decision Values
-
-
Safety Impact | -Type of Harm | -Description | -
---|---|---|
None | -All | -Does not mean no impact literally; it just means that the effect is below the threshold for all aspects described in Minor | -
Minor -(Any one or more of these conditions hold.) |
-Physical harm | -Physical discomfort for users (not operators) of the system | -
- | Operator -resiliency |
-Requires action by system operator to maintain safe system state as a result of exploitation of the vulnerability where operator actions would be well within expected operator abilities; OR causes a minor occupational safety hazard | -
- | System -resiliency |
-Small reduction in built-in system safety margins; OR small reduction in system functional capabilities that support safe operation | -
- | Environment | -Minor externalities (property damage, environmental damage, etc.) imposed on other parties | -
- | Financial | -Financial losses, which are not readily absorbable, to multiple persons | -
- | Psychological | -Emotional or psychological harm, sufficient to be cause for counselling or therapy, to multiple persons | -
Major -(Any one or more of these conditions hold.) |
-Physical harm | -Physical distress and injuries for users (not operators) of the system | -
- | Operator -resiliency |
-Requires action by system operator to maintain safe system state as a result of exploitation of the vulnerability where operator actions would be within their capabilities but the actions require their full attention and effort; OR significant distraction or discomfort to operators; OR causes significant occupational safety hazard | -
- | System -resiliency |
-System safety margin effectively eliminated but no actual harm; OR failure of system functional capabilities that support safe operation | -
- | Environment | -Major externalities (property damage, environmental damage, etc.) imposed on other parties | -
- | Financial | -Financial losses that likely lead to bankruptcy of multiple persons | -
- | Psychological | -Widespread emotional or psychological harm, sufficient to be cause for counselling or therapy, to populations of people | -
Hazardous -(Any one or more of these conditions hold.) |
-Physical harm | -Serious or fatal injuries, where fatalities are plausibly preventable via emergency services or other measures | -
- | Operator -resiliency |
-Actions that would keep the system in a safe state are beyond system operator capabilities, resulting in adverse conditions; OR great physical distress to system operators such that they cannot be expected to operate the system properly | -
- | System -resiliency |
-Parts of the cyber-physical system break; system’s ability to recover lost functionality remains intact | -
- | Environment | -Serious externalities (threat to life as well as property, widespread environmental damage, measurable public health risks, etc.) imposed on other parties | -
- | Financial | -Socio-technical system (elections, financial grid, etc.) of which the affected component is a part is actively destabilized and enters unsafe state | -
- | Psychological | -N/A | -
Catastrophic (Any one or more of these conditions hold.) | -Physical harm | -Multiple immediate fatalities (Emergency response probably cannot save the victims.) | -
- | Operator -resiliency |
-Operator incapacitated (includes fatality or otherwise incapacitated) | -
- | System resiliency | -Total loss of whole cyber-physical system, of which the software is a part | -
- | Environment | -Extreme externalities (immediate public health threat, environmental damage leading to small ecosystem collapse, etc.) imposed on other parties | -
- | Financial | -Social systems (elections, financial grid, etc.) supported by the software collapse | -
- | Psychological | -N/A | -
Safety Impact | +Type of Harm | +Description | +
---|---|---|
None | +All | +Does not mean no impact literally; it just means that the effect is below the threshold for all aspects described in Minor | +
Minor +(Any one or more of these conditions hold.) |
+Physical harm | +Physical discomfort for users (not operators) of the system | +
+ | Operator +resiliency |
+Requires action by system operator to maintain safe system state as a result of exploitation of the vulnerability where operator actions would be well within expected operator abilities; OR causes a minor occupational safety hazard | +
+ | System +resiliency |
+Small reduction in built-in system safety margins; OR small reduction in system functional capabilities that support safe operation | +
+ | Environment | +Minor externalities (property damage, environmental damage, etc.) imposed on other parties | +
+ | Financial | +Financial losses, which are not readily absorbable, to multiple persons | +
+ | Psychological | +Emotional or psychological harm, sufficient to be cause for counselling or therapy, to multiple persons | +
Major +(Any one or more of these conditions hold.) |
+Physical harm | +Physical distress and injuries for users (not operators) of the system | +
+ | Operator +resiliency |
+Requires action by system operator to maintain safe system state as a result of exploitation of the vulnerability where operator actions would be within their capabilities but the actions require their full attention and effort; OR significant distraction or discomfort to operators; OR causes significant occupational safety hazard | +
+ | System +resiliency |
+System safety margin effectively eliminated but no actual harm; OR failure of system functional capabilities that support safe operation | +
+ | Environment | +Major externalities (property damage, environmental damage, etc.) imposed on other parties | +
+ | Financial | +Financial losses that likely lead to bankruptcy of multiple persons | +
+ | Psychological | +Widespread emotional or psychological harm, sufficient to be cause for counselling or therapy, to populations of people | +
Hazardous +(Any one or more of these conditions hold.) |
+Physical harm | +Serious or fatal injuries, where fatalities are plausibly preventable via emergency services or other measures | +
+ | Operator +resiliency |
+Actions that would keep the system in a safe state are beyond system operator capabilities, resulting in adverse conditions; OR great physical distress to system operators such that they cannot be expected to operate the system properly | +
+ | System +resiliency |
+Parts of the cyber-physical system break; system’s ability to recover lost functionality remains intact | +
+ | Environment | +Serious externalities (threat to life as well as property, widespread environmental damage, measurable public health risks, etc.) imposed on other parties | +
+ | Financial | +Socio-technical system (elections, financial grid, etc.) of which the affected component is a part is actively destabilized and enters unsafe state | +
+ | Psychological | +N/A | +
Catastrophic (Any one or more of these conditions hold.) | +Physical harm | +Multiple immediate fatalities (Emergency response probably cannot save the victims.) | +
+ | Operator +resiliency |
+Operator incapacitated (includes fatality or otherwise incapacitated) | +
+ | System resiliency | +Total loss of whole cyber-physical system, of which the software is a part | +
+ | Environment | +Extreme externalities (immediate public health threat, environmental damage leading to small ecosystem collapse, etc.) imposed on other parties | +
+ | Financial | +Social systems (elections, financial grid, etc.) supported by the software collapse | +
+ | Psychological | +N/A | +