MONARC - Method for an Optimised aNAlysis of Risks by @CASES-LU
 
 
Go to file
Cédric Bonhomme 4bf9100c6a
set the session ttl to 60 minutes.
2018-01-15 15:24:20 +01:00
INSTALL fix link to vagrant script 2017-11-20 08:55:32 +01:00
config set the session ttl to 60 minutes. 2018-01-15 15:24:20 +01:00
data/cache Init commit > skeleton Monarc Project 2016-04-12 14:39:18 +02:00
db-bootstrap Renamed monarc_common to monarc_structure 2017-11-20 08:37:29 +01:00
deliveries/cases Update deliverable templates 2017-12-19 13:53:30 +01:00
public Folder for the future docs. 2017-06-21 23:02:55 +02:00
scripts replaced argument number of the public key by its equivalent 2017-09-27 10:31:27 +02:00
vagrant set the session ttl to 60 minutes. 2018-01-15 15:24:20 +01:00
.gitignore Updated .gitignore 2017-08-18 09:49:01 +02:00
.gitmodules Init commit > skeleton Monarc Project 2016-04-12 14:39:18 +02:00
AUTHORS Alpha ordering. 2018-01-12 21:59:30 +01:00
CHANGELOG.md Updated CHANGELOG. 2017-12-04 07:47:58 +01:00
LICENSE Added license file. 2017-07-10 09:11:24 +02:00
README.md Fixed an old link. 2018-01-12 23:40:26 +01:00
VERSION.json Updated CHANGELOG. 2017-12-04 07:47:58 +01:00
behat.yml Add behat tests including MonarcCore ones 2016-09-22 10:09:01 +02:00
build.properties working on setup 2016-10-06 11:19:13 +02:00
build.xml working on setup 2016-10-06 17:07:20 +02:00
composer.json phpoffice/phpword must use the stable branch 2017-07-12 08:41:39 +02:00
composer.phar global config 2017-01-24 09:46:23 +01:00
init_autoloader.php Init commit > skeleton Monarc Project 2016-04-12 14:39:18 +02:00
package.json Updated CHANGELOG. 2017-12-04 07:47:58 +01:00
packages.json Updated links to the GitHub organization. 2017-07-05 14:05:31 +02:00

README.md

MONARC - Method for an Optimised aNAlysis of Risks by CASES

Latest Release License Contributors Stars

Introduction

Depending on its size and its security needs, organisations must react in the most appropriate manner. Adopting good practices, taking the necessary measures and adjusting them proportionally: all this is part of the process to ensure information security. Most of all, it depends on performing a risk analysis on a regular basis.

Although the profitability of the risk analysis approach is guaranteed, the investment represented by this approach in terms of the required cost and expertise is a barrier for many companies, especially SMEs.

To remedy this situation and allow all organisations, both large and small, to benefit from the advantages that a risk analysis offers, CASES has developed an optimised risk analysis method: MONARC (Optimised Risk Analysis Method), allowing precise and repeatable risk management.

The advantage of MONARC lies in the capitalisation of risk analyses already performed in similar business contexts: the same vulnerabilities regularly appear in many businesses, as they face the same threats and generate similar risks. Most companies have servers, printers, a fleet of smartphones, Wi-Fi antennas, etc. therefore the vulnerabilities and threats are the same. It is therefore sufficient to generalise risk scenarios for these assets (also called objects) by context and/or business.

Documentation

You will find a user guide and a technical guide on the MONARC website.

For installation instructions see INSTALL.

If you want to test MONARC you can use the latest release available as a VirtualBox machine.

Contributing

If you are interested to contribute to the MONARC project, review our community page. There are many ways to contribute and participate to the project.

Feel free to fork the code, play with it, make some patches and send us the pull requests via the issues.

There is one main branch: what we consider as stable with frequent updates as hot-fixes.

Features are developed in separated branches and then regularly merged into the master stable branch.

Please, do not open directly a GitHub issue if you think you have found a security vulnerability. See our vulnerability disclosure page.

License

This software is licensed under GNU Affero General Public License version 3

For more information, the list of authors and contributors is available.