MONARC - Method for an Optimised aNAlysis of Risks by @CASES-LU
 
 
Go to file
Cédric Bonhomme 889e6c8abb
chg: [deployment] use npm ci in order to prevent local changes to the lock file instead of using npm install
2021-05-10 14:00:40 +02:00
.github Update php.yml 2021-03-05 17:26:01 +01:00
INSTALL Removed from the mospApiUrl /v1 and added a script to fix it for the release. 2021-03-24 11:48:13 +01:00
config Merge pull request #351 from monarc-project/feature/internationalization 2021-05-06 06:18:21 +00:00
db-bootstrap updated structure dump. 2019-09-12 13:03:51 +02:00
deliveries/cases Add DE deliverables for GDPR record 2019-08-14 15:24:09 +02:00
public Removed the phpinfo file 2020-07-03 15:39:30 +02:00
scripts chg: [deployment] use npm ci in order to prevent local changes to the lock file instead of using npm install 2021-05-10 14:00:40 +02:00
tests Removed from the mospApiUrl /v1 and added a script to fix it for the release. 2021-03-24 11:48:13 +01:00
vagrant chg: [vagrant] updated list of active languages in bootstrap MONARC configuration file. 2021-05-06 08:42:27 +02:00
.gitignore Ignore cache result file from phpunit. 2020-07-27 11:15:18 +02:00
AUTHORS Updated copyright years. 2020-01-03 10:04:51 +01:00
CHANGELOG.md Added the new release description and updated dependencies. 2021-05-10 11:58:45 +02:00
LICENSE
README.md Updated copyright years. 2020-01-03 10:04:51 +01:00
SECURITY.md Added SECURITY.md 2019-05-24 08:33:17 +02:00
VERSION.json Removed from the mospApiUrl /v1 and added a script to fix it for the release. 2021-03-24 11:48:13 +01:00
composer.json Added the new release description and updated dependencies. 2021-05-10 11:58:45 +02:00
composer.lock Added the new release description and updated dependencies. 2021-05-10 11:58:45 +02:00
package-lock.json fix: [security] closes GHSA-m5pj-vjjf-4m3h 2021-05-10 13:29:28 +02:00
package.json fix: [security] closes GHSA-m5pj-vjjf-4m3h 2021-05-10 13:29:28 +02:00
phpunit.xml Added the commit with the tests introduction. 2020-04-21 14:31:57 +02:00

README.md

MONARC - Method for an Optimised aNAlysis of Risks by CASES

Latest Release License Contributors Stars Workflow Twitter

Introduction

Depending on its size and its security needs, organisations must react in the most appropriate manner. Adopting good practices, taking the necessary measures and adjusting them proportionally: all this is part of the process to ensure information security. Most of all, it depends on performing a risk analysis on a regular basis.

Although the profitability of the risk analysis approach is guaranteed, the investment represented by this approach in terms of the required cost and expertise is a barrier for many companies, especially SMEs.

To remedy this situation and allow all organisations, both large and small, to benefit from the advantages that a risk analysis offers, CASES has developed an optimised risk analysis method: MONARC (Optimised Risk Analysis Method), allowing precise and repeatable risk management.

The advantage of MONARC lies in the capitalisation of risk analyses already performed in similar business contexts: the same vulnerabilities regularly appear in many businesses, as they face the same threats and generate similar risks. Most companies have servers, printers, a fleet of smartphones, Wi-Fi antennas, etc. therefore the vulnerabilities and threats are the same. It is therefore sufficient to generalise risk scenarios for these assets (also called objects) by context and/or business.

Documentation

You will find a user guide and a technical guide on the MONARC website.

For installation instructions see INSTALL.

You can also use the provided Virtual Machine Virtual Machine.

Contributing

If you are interested to contribute to the MONARC project, review our community page. There are many ways to contribute and participate to the project.

Feel free to fork the code, play with it, make some patches and send us the pull requests.

There is one main branch: what we consider as stable with frequent updates as hot-fixes.

Features are developed in separated branches and then regularly merged into the master stable branch.

Please, do not open directly a GitHub issue if you think you have found a security vulnerability. See our vulnerability disclosure page.

License

This software is licensed under GNU Affero General Public License version 3

For more information, the list of authors and contributors is available.

Data provided with MONARC (threats, assets, vulnerabilities, referentials, etc.) are licensed under CC0 1.0 Universal (CC0 1.0) - Public Domain Dedication. These objects are available through the MONARC Objects Sharing Plarform. If a specific author wants to license an object under a different license, a pull request can be requested.
You can find more information about MOSP on the dedicated repository.