SSCV is an open framework that adds critical context to vulnerability scoring. While CVSS tells you how bad a vulnerability could be, SSCV tells you how bad it actually is for your specific systems.
A CVSS 10.0 on an air-gapped, fully-patched system with no sensitive data is very different from a CVSS 6.0 on an internet-facing, unpatched server processing credit cards. SSCV captures this context.
Key Features:
- Contextual risk scoring that reflects your actual security posture
- Flexible adoption - start with what you can assess today
- Never reduces risk to zero (because perfect security doesn't exist)
- Grows with your security maturity
- Simple, transparent calculations
SSCV:1.0/OS:C/NE:I/AC:F/EP:A/DL:M/PS:C
This vector describes a current OS, internal network system with full access controls, advanced endpoint protection, containing mixed sensitive data, and current patches.
Calculate contextual risk:
Contextual Risk Score = CVSS Score × SSCV Context
Try the interactive calculator to experiment with SSCV scores and see real-time contextual risk calculations.
SSCV v1.0 evaluates 6 core security dimensions:
Component | Description | Best → Worst | Impact |
---|---|---|---|
OS | Operating System Currency | Hardened → Legacy | Security foundation |
NE | Network Exposure | Air-gapped → External | Attack surface |
AC | Access Control | Zero-trust → None | Authentication strength |
EP | Endpoint Protection | Managed SOC → None | Threat detection |
DL | Data Sensitivity | Public → Critical | Impact severity |
PS | Patch Status | Current → Unknown | Vulnerability exposure |
Use 'X' for any component you're not ready to assess - SSCV automatically adjusts calculations.
Scenario: Apache Struts vulnerability (CVSS 10.0) on two different systems
System A - Internet-facing web server:
SSCV:1.0/OS:C/NE:E/AC:F/EP:A/DL:M/PS:C
Contextual Risk Score: 5.8 (Medium)
System B - Air-gapped industrial system:
SSCV:1.0/OS:L/NE:A/AC:N/EP:N/DL:I/PS:U
Contextual Risk Score: 1.4 (Low)
Same vulnerability, different real-world risk.
- Vulnerability Prioritization: Sort by actual risk, not theoretical severity
- Compliance Reporting: Document risk-based patching decisions
- Security Metrics: Track security posture improvements over time
- Cyber Insurance: Potential premium adjustments based on SSCV scores
- M&A Due Diligence: Assess security debt in acquisitions
- Industrial Control Systems: Assess OT/ICS systems with safety and operational constraints
- Critical Infrastructure: Balance security with availability and safety requirements
See examples/ for detailed use cases and integration patterns.
Q: Do I need to assess all components?
A: No! Start with what you know. Use 'X' for components you can't assess yet.
Q: Why can't I get to zero risk?
A: Because perfect security doesn't exist. Even the best defenses can be bypassed.
Q: How often should I update SSCV scores?
A: Quarterly for most systems, or after significant changes.
Q: How does the calculation work?
A: SSCV calculates Context Multiplier (average of OS, AC, EP, PS) × Exposure Factor (NE × DL / 9), applies a 0.7 reality adjustment, and enforces a 20% minimum threshold.
We welcome contributions! Whether it's:
- Bug reports
- Feature ideas
- Documentation improvements
- Code contributions
- Translations
Please see CONTRIBUTING.md for guidelines.
SSCV is released under the Apache License 2.0. Use it freely in commercial and open source projects.
Remember: Security is a journey, not a destination. SSCV helps you prioritize that journey based on your actual risk, not theoretical vulnerabilities.
Start small, iterate often, and improve continuously.