2016-04-12 14:39:18 +02:00
|
|
|
Skeleton Monarc Project
|
|
|
|
=======================
|
|
|
|
|
2017-02-06 08:47:37 +01:00
|
|
|
*Disclaimer: This is a work in progress and software is still in alpha stage.*
|
|
|
|
|
2016-04-12 14:39:18 +02:00
|
|
|
Introduction
|
|
|
|
------------
|
2017-06-21 22:39:25 +02:00
|
|
|
CASES promotes information security through the use of behavioral,
|
|
|
|
organizational and technical measures. Depending on its size and its security
|
|
|
|
needs, organizations must react in the most appropriate manner.
|
|
|
|
Adopting good practices, taking the necessary measures and adjusting them
|
|
|
|
proportionally: all this is part of the process to ensure information security.
|
|
|
|
Most of all, it depends on performing a risk analysis on a regular basis.
|
|
|
|
|
|
|
|
Although the profitability of the risk analysis approach is guaranteed, the
|
|
|
|
investment represented by this approach in terms of the required cost and
|
|
|
|
expertise is a barrier for many companies, especially SMEs.
|
|
|
|
|
|
|
|
To remedy this situation and allow all organizations, both large and small, to
|
|
|
|
benefit from the advantages that a risk analysis offers, CASES has developed an
|
|
|
|
optimised risk analysis method: MONARC (Method for an Optimised aNAlysis of
|
|
|
|
Risks by CASES), allowing precise and repeatable risk management.
|
|
|
|
|
|
|
|
The advantage of MONARC lies in the capitalization of risk analyses already
|
|
|
|
performed in similar business contexts: the same vulnerabilities
|
|
|
|
regularly appear in many businesses, as they face the same threats and generate
|
|
|
|
similar risks. Most companies have servers, printers, a fleet of smartphones,
|
|
|
|
Wi-Fi antennas, etc. therefore the vulnerabilities and threats are the same.
|
|
|
|
It is therefore sufficient to generalize risk scenarios for these assets (also
|
|
|
|
called objects) by context and/or business.
|
2016-04-12 14:39:18 +02:00
|
|
|
|
2017-02-13 15:39:06 +01:00
|
|
|
More information: [Optimised risk analysis Method] (https://www.cases.lu/index-quick.php?dims_op=doc_file_download&docfile_md5id=56ee6ff569a40a5b52bed0e526a6a77f) (pdf)
|
|
|
|
|
2017-05-26 10:36:54 +02:00
|
|
|
|
2017-06-21 22:54:16 +02:00
|
|
|
Documentation
|
2017-01-31 10:45:04 +01:00
|
|
|
-------------
|
|
|
|
|
2017-07-05 14:05:31 +02:00
|
|
|
For a general documentation see [here](https://github.com/monarc-project/MonarcAppFO/tree/master/docs).
|
2017-06-21 23:02:55 +02:00
|
|
|
|
2017-07-05 14:05:31 +02:00
|
|
|
For installation instructions see [INSTALL](https://github.com/monarc-project/MonarcAppFO/tree/master/INSTALL).
|
2017-01-31 10:45:04 +01:00
|
|
|
|
2017-05-26 10:36:54 +02:00
|
|
|
|
2017-02-06 09:18:18 +01:00
|
|
|
License
|
|
|
|
-------
|
|
|
|
|
2017-02-06 08:24:06 +01:00
|
|
|
This software is licensed under [GNU Affero General Public License version 3](http://www.gnu.org/licenses/agpl-3.0.html)
|
|
|
|
|
|
|
|
Copyright (C) 2016-2017 SMILE gie securitymadein.lu
|