File size: 982 Bytes
5fe70fd
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
{
    "id": "bundle--c93afaab-2fef-49f2-89ab-0914e853032b",
    "objects": [
        {
            "created": "2014-06-23T00:00:00.000Z",
            "created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd",
            "description": "Assume all input is malicious. Create an allowlist that defines all valid input to the software system based on the requirements specifications. Input that does not match against the allowlist should not be permitted to enter into the system. Test your decoding process against malicious input.",
            "id": "course-of-action--001320df-5e57-4ed3-bcf8-7e79dfe846aa",
            "modified": "2022-09-29T00:00:00.000Z",
            "name": "coa-120-0",
            "object_marking_refs": [
                "marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d"
            ],
            "spec_version": "2.1",
            "type": "course-of-action",
            "x_capec_version": "3.9"
        }
    ],
    "type": "bundle"
}