Vulnerabilities are defined as weaknesses or loopholes in a system that can be exploited by attackers. The existence and eventual exploitation of these vulnerabilities can disrupt systems and businesses as well as expose sensitive or personal information.
SIRP’s Vulnerability Management helps security teams identify and prioritize high-risk vulnerabilities
Vulnerability Management module can be accessed by opening the Main Menu and clicking on Vulnerability Management. The list of vulnerabilities identified within an organization will open up.
You can click on the Search bar to filter the list or apply a search filter for any specific type of vulnerability.
You can export the list in PDF or Excel format by clicking on Export as drop down displayed at the top right of the page.
You can also click on the view button displayed under the Action tab. You will be redirected to a page, where you can view the vulnerability’s details.
The information on the page is divided into multiple tabs:
Timeline: Provides a detailed timeline of the reported vulnerability and which analyst has been working on it.
: Provides the threat details that an asset is exposed to.
Details: Provides the details of the vulnerability in a tabular form
CVSS V2: Provides the characteristics and impacts for the vulnerability according to the open framework of CVSS Version 2.
CVSS V3: Provides you with CVSS metrics for the vulnerability.
Assets: All the assets tagged with the vulnerability are listed in this tab.
Management Feedback: Provides feedback from asset stakeholders
Cases: Any cases opened for the vulnerability or any cases in which this vulnerability has been tagged are listed in this tab. You can click on the Case to view the Case details.
Scan History: Provides a history of VA scans, where the vulnerability has been highlighted.
SIRP allows analysts to update the status of multiple Vulnerabilities at once. It also provides the option to create custom vulnerabilities and update them.
Select multiple items and click on Bulk Update button at the top of the Vulnerability Management module.
This will open a pop-up window.
Update the status of resolved whether yes or no.
SIRP also allows you to initiate (manual or tool-based) vulnerability assessments. To view and manage the list of existing assessments, navigate to the Main Menu, select Vulnerability Management, and click on the Assessments button displayed at the top of the page.
Main Menu > Vulnerability Management > Assessments
You can Generate, View, View Logs, Manage Assessment and Delete, and Manage Vulnerabilities for any assessment by clicking on the respective button, in the drop-down under the Action column.
If you wish to add a new assessment, click on the Initiate Assessment button provided at the top. You will be redirected to a page where you can fill in the required fields and click on the Create button displayed at the bottom. This option allows you to create an assessment by manually adding the vulnerabilities (particularly useful in documenting Pen-Test results).
The newly created record will appear in the assessments list.
Initiate Vulnerability Scan
To shorten investigation times, SIRP allows you to initiate vulnerability assessments from the vulnerability management module.
To access this, navigate to the Main Menu, select Vulnerability Management, and click on the Assessments button displayed at the top of the page.
Main Menu > Vulnerability Management > Assessments > Initiate Automated Assessments
After clicking Initiate Automated Assessments, a new window will open up.
Fill in the details such as Application, Config, Input Type, Site, Scan Engine, and Templates.
After initiating the scan, view the results.
Track the resolved and new vulnerabilities from the top of the window. It will show you the status of all vulnerabilities.
SIRP also allows you to import vulnerability assessment reports from third-party VA tools (Tenable, Nexpose, Rapid 7, Qualys, etc.) into SIRP by clicking on the Upload button displayed at top of the Assessment page.
SIRP also allows you to export vulnerability assessment reports in form of an Excel or PDF by clicking on the Generate Report button displayed on the Vulnerability Assessments page in the dropdown.
Cases enable the security team to run an effective vulnerability management program within an organization. A case can be opened for one or more vulnerabilities when the resolution of those vulnerabilities is required.
To manage the list of Vulnerabilities-related cases, navigate to the Main Menu, select Vulnerability Management, and click on the Cases button displayed at top of the page.
Main Menu > Vulnerability Management > Cases
You can add Task, View, Update, or Delete these cases by clicking on the respective option displayed under the Actions column.
If you wish to add a new case, click on the Open Case button displayed on the top left of the Vulnerability view. You will be directed to a page where you must fill in the required fields in the given sections i.e. Information, Evidence, and Remediation. Once done, click on the Create button displayed at the bottom of the page.
While creating a case from the vulnerability module, you can add multiple case items (vulnerabilities) within one case.
The newly created case will appear in the main cases list.