Vulnerability Management Overviews
The Vulnerability Management Overview page enables rapid identification of:
- Vulnerability Management (VM) trends
- Pervasive vulnerabilities and policy failures
- New risks
- Riskiest segments of your environment
The Overview provides reportable trend analysis that you can download as reports, export to create tickets, or share with team members. From the Overview, you can pivot into remediation workflows for specific CVEs, policies, architecture segments or coverage gaps.
The Vulnerability Management Overview page is refreshed daily. Data might take up to 24 hours to appear.
Prerequisites
Sysdig Secure (SaaS) using current Vulnerability Management engine.
A current Sysdig agent that includes the Vulnerability Management engine.
The Host Scanner.
The Runtime Scanner for Runtime.
Sysdig CLI Scanner for Pipeline.
Container Registry Scanner for Registry.
Advanced User permissions or higher.
Getting Started with Vulnerability Management
For full vulnerability coverage, ensure you have completed the prerequisites.
Log in to Sysdig Secure and select Vulnerabilities.
The out-of-the-box policies for Pipeline and Runtime vulnerabilities will work without further setup.
Choose Pipeline, Registry, or Runtime to see the scanning results.
Choose Reporting to configure schedules for creating downloadable reports on runtime vulnerability results.
To create or edit Pipeline or Runtime vulnerability Policies and Rule Bundles, select the relevant links from the Policies tab in the navigation bar.
To accept the risk of detected vulnerabilities, configure an acceptance based on scope, justification, and length of time.
Optionally, download the vulnerability report in PDF format. To get a report in PDF format, select the entity and click Download PDF.
Understand the UI
Log in to Sysdig Secure.
Under Vulnerabilities | Overviews, select one of the following:
- All Vulnerabilities
- Pipeline
- Registry
- Runtime
Each page shows corresponding trend analysis that you can download as reports, export to create tickets, or pivot into remediation workflows for specific CVEs, policies, architecture segments or coverage gaps.
Pipeline
The Vulnerability Management Pipeline page provides a quick overview of the pipeline scanning results. You can filter the results by Zones and Pullstrings to narrow your search. You can also use additional filters to further refine the results by severity, vulnerability type, or policy.
Registry
The Vulnerability Management Registry page gives you a quick overview of the results from the registry scanning. You can filter by Zones, Vendors, and Registry to narrow the results. You can also use additional filters to further refine the results by severity, vulnerability type, or policy.
Runtime
The Vulnerability Management Runtime page gives you a quick overview of the results from runtime scanning. To narrow the results, you can filter by the following:
- Zones: The Zones created in your environment
- Resource Types : Host, Workload, and Container
- Cluster : Kubernetes Cluster
- Namespace: Kubernetes Namespace
- Hostname: The available hosts in your Cloud or Kubernetes environment
Additional filters are also available to further refine the results by severity, vulnerability type, or policy.
Filters
Select top-level filters to focus on a particular subset of vulnerability or policy data: severity and type.
Severity
Select any or all criticality level: Critical, High, Medium
Type
Select the package and CVE context variables: Has Exploit, In Use, and Has Fix
Date
The CVE trend chart displays data from the past 30 days. You can use the date selector or double-click on a day to see the Vulnerability panel results filtered for just that day.
Note that runtime and pipeline scans are performed twice a day, while registry scans are only performed after an action.
All context filters apply to the widget on the page, the drill-down drawers, and exports of data.
Risk Acceptance
Filter out accepted risks to help you focus on active, unresolved issues. Select one of the following options:
- All Risks: See all the risks.
- Risks Accepted : View only accepted risks.
- Risks Not Accepted: Hide all the accepted risks.
These filters are available also in the Vulnerabilities tab in the scan result page.
Scan Data Timelines
Each panel reports on the behavior of scans for the past 30 days. Individual scan data from:
- Runtime is retained for 14 days
- Registry and Pipeline is retained for 90 days
- Package Details in the the drill-down is available for 48 hours
Use Cases
Vulnerability Management Usage
The top panel is designed to guide Vulnerability Management workflows.
This panel gives an overview of:
- Trends of Unique Vulnerabilities in the environment over the past 30 days
- Most Pervasive vulnerabilities
- Recently Released vulnerabilities, and
- Namespaces with the most vulnerability detections
These let you answer questions about their risk posture, such as:
- Are my CVE detection trending down?
- What are the most pervasive vulnerabilities?
- What are the most recent vulnerabilities (log4j-type event)?
- What is my most vulnerable application, segment or zone?
Each line item expands to a detail panel for further investigation.
The identified resources, vulnerabilities, or policies in the dropdown can be further filtered and exported via the Sysdig reporting or through a .csv
file.
Policy and Risk Management Usage
The Compliance Manager asks three fundamental questions.
- Which of my Compliance programs is struggling with control failures?
- Which of the controls is failing the most?
- Which of my applications, segments, or zones is failing the most policies?
The Policy Panel provides insight to all of these questions via the widgets:
- Top Failing Policies
- Top Failing Assets
- Top Failing Rule Sets
Dropdowns provide for more information and options to export.
Sample Flows
Identify Progress through Metrics
- Choose a Filters for Phase (if applicable).
- Choose CVE type filters.
- Filter on segments of the infrastructure (if necessary).
- Review the metrics graph to see trends.
- Click on days to identify the difference between them.
- Export any data to
.csv
from a subpanel. - Export the page including the graph to PDF for reports to executive.
Identify a Problematic CVE
- Filter by Has Fix, Has Exploit, and possibly In Use.
- Filter by desired severity.
- Review the Top Recent or Top Pervasive widget.
- Identify a New or Particularly pervasive CVE.
- Click into the dropdown.
- View the assets and associated packages.
- Choose:
- Create a Report
- Export the list of assets and packages to CSV
- Click through to the results page of a single asset.
Reports and Exports
There are various ways that the Vulnerability Management Dashboard can support your workflows through data exports.
Download Scan Results
You can download scan results for pipeline, runtime, and registry scanning in PDF, CSV, and Zip format.
The downloaded file includes up to 100 rows and is sorted by severity. To download the desired scan results, use the Download PDF button found across the Overview, Vulnerabilities, Content, Policies, and Detail tabs.
CSV
You can download vulnerability report in CSV and Zip format for Pipeline, Registry, and Runtime scanning results.
Select the asset and click the Vulnerabilities tab.
Click Export data.
The Export Data screen appears.
Select either CSV or Zip.
Click Export.
Executive Reports
The dashboard can be scoped and filtered to support a focused view of trending and critical issues. Once filtered, you can export the Dashboard to PDF for inclusion in executive reports, audit artifacts, or briefings.
Critical Vulnerability or Policy Tables
You can export data in tabular form from any of the widgets or panels on the VM Dashboard using the cloud download button on the panel. You can use this data in business intelligence or tracking tools.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.