"OpenVEX: Sharing Exploitability Statements to Cut Vulnerability Noise"
Modern vulnerability programs drown in findings that are technically "present" but operationally irrelevant. This book is for experienced security engineers, product security teams, and platform/SRE leaders who need to turn scanner output into defensible decisions—without trading speed for blind suppression. You'll learn how OpenVEX converts supplier knowledge and runtime reality into a precise, automatable signal that reduces ticket storms while improving downstream trust.
You'll master OpenVEX from first principles through production-grade practice: the JSON-LD document model, statement anatomy, vulnerability and product identification, status taxonomy, and the evidence that makes "not_affected" credible. The book goes deep on the hard parts—stable identifiers (purl/CPE/hashes), subcomponent scoping, matching algorithms, update/version semantics, and how to write action statements that drive remediation. It also covers tooling workflows (validation, merging, CI quality gates, distribution) and end-to-end publisher/consumer pipelines that validate, enforce, and audit decisions.
Prerequisites include comfort with SBOM-driven processes, vulnerability management, and CI/CD automation. Throughout, the focus is on interoperability and trust: spec milestones, translation across VEX ecosystems, and provenance via signing/attestations (Sigstore/in-toto) so OpenVEX can be safely applied as policy, not just documentation.