Aqua Hub Risk Dashboard
This functionality is being shown in Preview mode. It is not yet available to customers.
TABLE OF CONTENTS
Overview
The Risk Dashboard provides a high-level view of security risks in your environment:
- Security issues: potentially dangerous combinations of risks
- Vulnerabilities: security flaws, glitches, or weaknesses found in software code that could be exploited by an attacker
- Sensitive data: exposed tokens, keys, credentials, or other types of sensitive data
- Misconfigurations: infrastructure misconfigurations that breach compliance or best practices
- Incidents: suspicious behavior or malicious processes running; this includes malware
Access the Risk Dashboard
Select the Aqua Hub module from the mega menu.
Click the Dashboards menu item, and select Risk Dashboard from the options at the next lower level.
You will see a screen like this. Because this UI page is long, only part of it is shown here; the remaining sections are shown and described below.
Data refresh
The data displayed in the dashboard is refreshed automatically once a day. You can force a refresh by clicking the refresh control shown at the top left.
Screen layout and contents
The Risk Dashboard is divided into several areas; each extends horizontally across the screen. Each is shown (with a sample for illustration) and described.
Security Issues
The top area of the screen comprises two widgets: Open Issues and Top Issues of the Week.
- Open Issues: Security issues (potentially dangerous combinations of risks) that have not been resolved, moved to "in progress" state, or mitigated (by reclassification as non-risky, or by user application of a vShield).
- Top Issues of the Week: Every Monday, the list of all issues in your environment is sorted by severity (highest first) and then by the number of instances (highest first). Example:
- Issue XYZ (critical severity): 32 instances
- Issue ABC (critical severity): 19 instances
- Issue LMN (high severity): 124 instances
- (etc.)
Up to the first 5 are displayed in this widget. This data is regenerated each week, and the contents of this widget are updated.
Latest Issues Detected and Application Heatmap
Moving down, we see two more widgets: Latest Issues Detected and Application Heatmap.
- Latest Issues: The three security issues most recently discovered in your environment
- Application Heatmap: A graphical depiction of the number of risks of each type; they are shown separately for where the risks were found: in your application code, software images, or cloud resources
Overview of other risks: vulnerabilities, sensitive data, misconfigurations, and incidents
Each of the remaining screen areas presents overview information for one of the remaining types of risks: vulnerabilities, sensitive data, misconfigurations, and incidents. For example, this overview pertains to vulnerabilities:
As is shown above, the overview includes three widgets:
- [risk type] Detected: The number of risks of the relevant risk type detected in your environment, broken down by severity: critical, high, medium, and low. (Note that this does not include incidents that have been mitigated.) For each, two figures appear: the number found most recently, and the number found 7 days ago (if available).
- Top [risk type] of the Week: Every Monday, all risks of the relevant type are sorted by severity (highest first) and then by the number of instances (highest first). Example for vulnerabilities:
- Vulnerability XYZ (critical severity): 32 instances
- Vulnerability ABC (critical severity): 19 instances
- Vulnerability LMN (high severity): 124 instances
- (etc.)
Up to the first 5 are displayed in this widget. This data is regenerated each week, and the contents of these widgets are updated.
- [risk type] Detected vs Mitigated Trend: A graph, showing the number of risks of the relevant risk type, that were present over the last 5 weeks. At each data point, 2 numbers are presented: the total number of risks detected (but not mitigated) and the number that have been mitigated.
You can see the actual numbers by hovering the pointer over the graph. For example:
Did you find it helpful? Yes No
Send feedback