Vulnerabilities

The "Vulnerability" tab provides an overview of identified security weaknesses within the system, detailing their severity, affected assets, and recommended remediation actions.

Note 1: This tab has the same functionalities as the "Projects" > "Vulnerabilities tab" in project details.

Note 2: Visible to Security Analysts and IT Engineers who are vulnerabilities' owners. Users with an IT Engineer role who is the vulnerability's "Risk Owner" can edit its "Status", "Impact", "Remediation", and "Comments" fields. IT Engineers cannot change the ownership of a vulnerability, even if they are one of its existing owners

The "Vulnerabilities" section provides a comprehensive list of both automatically extracted and manually created vulnerabilities associated with all projects and assets.

The automatically extracted vulnerabilities are the ones imported from the "Inputs" tab in the project details (See Projects) or through scans. The manually added vulnerabilities are the ones added from "Projects" > "Project details" > "Vulnerabilities" > "Create new" icon.

Note: Only Super Admins and Security Analysts who are project owners can manually add vulnerabilities.

You can also leverage sorting and filtering options for in-depth vulnerability analysis.

Sorting

  1. You can sort your vulnerability list like a spreadsheet

  • Click a column header (like name or CVSS) to sort by that column, with an arrow showing up/down in ascending/descending order.

  • You can even sort by multiple columns - click another header, and a number appears next to it, showing its order in the sorting process.

  1. You can toggle various columns on and off and change their order.

  • Click on the settings icon at the top right corner of the grid. A prompt like the one below will appear.

  • Click on the "Up arrow" [↑] to move a column to the left on the grid and the "Down arrow" [↓] to move it to the right of the grid.

  1. To save the custom configurations of the current columns sorting and ordering:

  • Click on the page configurator icon [], then a prompt will appear.

  • Name the current configuration and click the "Save" button.

  • You can click on the "Make default" button to make the configuration appear every time you visit the "Vulnerabilities" page.

  • You can also load a custom configuration you previously saved from the "Load From Saved Configurations" dropdown list.

Filtering

To filter the vulnerabilities by various criteria:

  1. Click on the filter icon [á—Š] on the top left corner just above the vulnerabilities grid.

  2. Enter your criteria. Note that you can also filter by Jira relation (for example, "Currently linked with Jira", "Never linked with Jira", "When Jira ticker is deleted");

  3. Click the "Search" button.

  4. Click the "Close" icon [X] on the top right corner of the "Filter" panel to hide it.

Vulnerability Details

To view a vulnerability's details:

  1. Click on the "Preview" button from the three dots icon in the "Actions" column at the end of the vulnerability row.

  1. Then, a window similar to the one below will appear:

  1. If the vulnerability is associated with a Jira ticket, a "View in Jira" button will appear at the top right corner of the screen. Once you click it, you will be redirected to that ticket in the Jira platform.

Note: You can add a vulnerability to Jira by entering the edit mode and clicking on the "Create in Jira" button, which will appear in place of the "View in Jira" button.

Vulnerabilities Change Log

The "Change Log" feature provides a detailed record of every action performed by users on the project. Here's how to access and interpret the information in the "Change Log":

Accessing the Change Log:

Click on the "Change Logs" button in the "Actions" column associated with the desired vulnerability.

Change Log Grid:

Upon clicking the "Change Logs" button, a pop-up grid will appear, displaying the following information:

  • Action Type: Describes the type of action performed by the user, such as creating a new project, updating project details, or other.

  • Date Stamp: Indicates the date and time when the action was executed.

  • User: Identifies the user who performed the action.

Understanding the Change Log:

The "Change Log" is a valuable tool for tracking project activities and user interactions. Each entry in the grid provides insights into the history of changes made within a project, allowing users to review and audit actions.

Note: The "Change Log" enhances transparency, accountability, and the ability to trace the evolution of a project over time.

Editing Vulnerabilities

To edit a vulnerability:

  1. Click on the edit icon at the end of the vulnerability's row you would like to edit;

  2. A window with the vulnerability's details will appear.

Deleting a Vulnerability

To delete a vulnerability, click on the "Delete" button in the "Actions" column associated with the vulnerability.

Last updated