Home » Marketplace » Maintenance

Maintenance

Runtime security monitoring

Verify any security violation at runtime, monitoring stack for the run-time conditions so that the self- learning and self-healing mechanisms can be fed.  

PIACERE Framework

Keywords: cybersecurity, static analysis, model checking, Wazuh, vulnerability assessment 

Benefits: 

  • Able to run integrated vulnerability scanners to scan web applications and detect web vulnerabilities  

Component Security Inspector

Analysing also the IaC code, reports the potential vulnerabilities and proposes potential fixes, addressing the dependency information from the IaC and application code, detect included programs and libraries with known vulnerabilities by querying public vulnerability databases, and produce a report to the PIACERE user.  

PIACERE Framework

Keywords: IaC, component, scanner, vulnerability, reports 

IaC Code Security Inspector

Avoid misconfigurations, insecure coding and configuration patterns through an automated solution for checking the integrity and applicability of IaC code that is to be deployed on an infrastructure. 

PIACERE Framework

Keywords: IaC, code quality, infrastructure, misconfigurations 

Benefits: 

  • Identifies possible vulnerabilities and improvements 

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

Pages

News

Wojciech Wideł, Preetam Mukherjee, and Mathias Ekstedt from our partner KTH published in IEEE Access about their work in the SOCCRATES project.

Future Events

In order to ensure that the SOCCRATES platform is fit for purpose, the project will carry out three pilots to validate the platform in realistic environments. This webinar will show results and experiences from the second pilot, in which the complete SOCCRATES platform was validated in realistic (on-site) environments at Vattenfall, mnemonic and Shadowserver.

Presentation by
Martin Eian, Researcher, Mnemonic
Piotr Kijewski, CEO Shadowserver
Maciej Kosz, IT Security Officer, Vattenfall

27/09/2022

SOCCRATES provides a deep dive session on the SOCCRATES platform at the ONE Conference 2022. 
 

Within the H2020 EU project SOCCRATES a security decision support platform has been developed for Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs). This, so called ‘SOCCRATES Platform’ is targeted at organisation’s inhouse SOC and at Managed Security Service Providers (MSSP) that provide SOC services.

18/10/2022