Vulnerability Management Dashboard Essentials Part 1
1 min readJul 10, 2023
IN This article, we will learn how to manage your Vulnerability management Dashboard over Qualys, Rapid7, Tenable, Risk-Sense tools. And will understand below expects:
- What should you have to keep in your Dashboard for best monitoring perspectives?
- How can we manage assets, track active vulnerabilities?
- How remediation is going on?
Let’s understand what should be in VM Dashboard
- Assets count
- Assets scanned with Authentication status like successful or failed
- Top 10 vulnerable assets
- Vulnerable assets by severity
- True risk against the Organization
- Active vulnerability count
- Top 10 active vulnerabilities
- Active vulnerabilities by aging
- Fixed vulnerabilities vs ageing
- Backlog vulnerabilities status
- Re-opened vulnerabilities status
- Unique vulnerabilities by severity
- OWASP top 10 vulnerabilities
- Application related vulnerabilities
- Operating system level vulnerabilities
- Application servers vulnerabilities
- Exploitable Vulnerability
- Remote code Execution vulnerability / Potential exploit
- PCI Status(Payment Card industry)
- Weaponization vulnerability
- Assets which are not scanned from last 30 days
We will see you in next part with more explanation of these above.