vulnerability management reporting treasures in tripwire security intelligence hub 2.7

Post on 25-Jul-2015

414 Views

Category:

Software

11 Downloads

Preview:

Click to see full reader

TRANSCRIPT

REPORTING TREASURESIn Tripwire Security Intelligence Hub

Michael McKay, CISSP, CISA, Consulting Security EngineerJune 3rd, 2015

2

Vulnerability Aging ReportNew Report in Tripwire Security Intelligence Hub 2.7

Displays results in a comprehensive tabular format that details each host and vulnerability combination to help you understand: How long has this vulnerability existed in our environment? How long did it take for this vulnerability to be remediated? How many days remaining to remediate this vulnerability under the SLA? If the vulnerability is past the SLA, how many days have passed?

3

Vulnerability Variance ReportNew Report in Tripwire Security Intelligence Hub 2.7

A differential report for measuring the dynamics of your vulnerability management program, including the inflow of vulnerabilities and outflow of remediation.

How many vulnerabilities have been remediated since the previous period? How many were have NOT been remediated since the previous period? How many vulnerabilities weren’t seen in the previous period? How many new hosts were identified that were not found in the previous

period? How many hosts were NOT found since the previous period?

5

Vulnerability Variance ReportNew Report in Tripwire Security Intelligence Hub 2.7

6

SSL Certificate ReportNew Report in Tripwire Security Intelligence Hub 2.7

Identifies the SSL certificates in your environment, when they expire, and who issued the certificate.

7

SQL Query ReportNew Report in Tripwire Security Intelligence Hub 2.7

Allows users with administrative privileges to create reports based on their own SQL queries.

8

Example SQL ReportsExamples are available for download from the Tripwire Customer Center

Vulnerabilities Published In Last 30 DaysShows hosts that are vulnerable to recently published vulnerabilities

Last Full Scan Per Network by Network GroupDisplays the last time, host count, vulnerability count and total risk score, that a network was successfully fully scanned (either by an on demand or scheduled scan)

Last Scan Credential Count by NetworkDisplays a comparison of hosts to the number of authenticated hosts and total vulnerability scores

IP360 Credential FailuresDisplays authentication failures and type by IP

CCM Hosts Without Successful AuthenticationDisplays all CCM unauthenticated hosts

Host Data Items By AuditDisplays all host configuration items gathered from a single audit in an exportable format.

9

CVSS Base Scores

Specify the use of CVSS Base Scores for standards-based comparison with

other security controls and processes

Also available in the following reports: Vulnerability Inventory Executive Summary Most Common Vulnerabilities Host/Application Host/Vulnerability

top related