MONARC - Method for an Optimised aNAlysis of Risks by @CASES-LU
 
 
Go to file
Cedric 74d0db0ceb
Merge pull request #430 from monarc-project/dependabot/npm_and_yarn/grunt-1.5.2
Bump grunt from 1.4.1 to 1.5.2
2022-05-19 09:13:18 +00:00
.github
INSTALL Update INSTALL.rhel7.9.md 2022-05-12 09:52:47 +02:00
config
db-bootstrap
deliveries/cases
public
scripts chg: [CSS] updated path of the flags. 2022-05-19 11:08:43 +02:00
tests
vagrant
wsl
.gitignore
AUTHORS chg: updated README !minor 2022-03-21 09:58:06 +01:00
CHANGELOG.md
LICENSE
README.md chg: [CSS] updated path of the flags. 2022-05-19 11:08:43 +02:00
SECURITY.md
VERSION.json
composer.json
composer.lock updated zm-core dependency to v2.11.1-p11 2022-04-06 10:10:28 +02:00
package-lock.json Bump grunt from 1.4.1 to 1.5.2 2022-04-27 10:39:43 +00:00
package.json Bump grunt from 1.4.1 to 1.5.2 2022-04-27 10:39:43 +00:00
phpunit.xml

README.md

MONARC - Method for an Optimised aNAlysis of Risks by CASES

Latest Release License Contributors Stars Workflow Twitter

Introduction

Depending on its size and its security needs, organisations must react in the most appropriate manner. Adopting good practices, taking the necessary measures and adjusting them proportionally: all this is part of the process to ensure information security. Most of all, it depends on performing a risk analysis on a regular basis.

Although the profitability of the risk analysis approach is guaranteed, the investment represented by this approach in terms of the required cost and expertise is a barrier for many companies, especially SMEs.

To remedy this situation and allow all organisations, both large and small, to benefit from the advantages that a risk analysis offers, CASES has developed an optimised risk analysis method: MONARC (Optimised Risk Analysis Method), allowing precise and repeatable risk management.

The advantage of MONARC lies in the capitalisation of risk analyses already performed in similar business contexts: the same vulnerabilities regularly appear in many businesses, as they face the same threats and generate similar risks. Most companies have servers, printers, a fleet of smartphones, Wi-Fi antennas, etc. therefore the vulnerabilities and threats are the same. It is therefore sufficient to generalise risk scenarios for these assets (also called objects) by context and/or business.

Documentation

You will find a user guide and a technical guide on the MONARC website.

For installation instructions see INSTALL.

You can also use the provided Virtual Machine.

Contributing

If you are interested to contribute to the MONARC project, review our community page. There are many ways to contribute and participate to the project.

Feel free to fork the code, play with it, make some patches and send us the pull requests.

There is one main branch: what we consider as stable with frequent updates as hot-fixes.

Features are developed in separated branches and then regularly merged into the master stable branch.

Please, do not open directly a GitHub issue if you think you have found a security vulnerability. See our vulnerability disclosure page.

License

This software is licensed under GNU Affero General Public License version 3

For more information, the list of authors and contributors is available.

Data provided with MONARC (threats, assets, vulnerabilities, referentials, etc.) are licensed under CC0 1.0 Universal (CC0 1.0) - Public Domain Dedication. These objects are available through the MONARC Objects Sharing Plarform. If a specific author wants to license an object under a different license, a pull request can be requested.
You can find more information about MOSP on the dedicated repository.