v1.0 — Security Methodologies
The process behind every mapping, score, and assessment
secid:methodology/nist.gov/ir-8477#strm
→ Set Theory Relationship Mapping — highest evidentiary weight
→ "Was this mapping done via STRM or a simple crosswalk?"
secid:methodology/first.org/cvss@4.0
→ CVSS v4.0 vulnerability scoring methodology
secid:methodology/cmu.edu/ssvc@2.0
→ Stakeholder-Specific Vulnerability Categorization
39 methodologies across 18 namespaces — scoring (CVSS, SSVC, EPSS), mapping (IR 8477, CTID), risk (ISO 27005, FAIR, NIST RMF), threat modeling (STRIDE, PASTA), testing (OWASP, PTES, OSSTMM), and more.
When someone says "this control maps to that framework" — the methodology type lets you ask how that mapping was established.