Vulnerability
The Vulnerability tab offers a clear view of known security weaknesses and risks for a Configuration Item (CI). It helps identify and prioritize remediation efforts by listing vulnerabilities found during scans or integrations.
How to use:
-
Navigate to CMDB and select a CI.
-
Click the Vulnerability tab.
-
Review CVEs and filter by severity, ID, or publish/modify date.
-
If no records appear, the CI may have no known vulnerabilities or scanning may be pending.
Purpose & benefit:
-
Track and manage security risks at the CI level.
-
Maintain compliance with vulnerability management policies.