IT Security Vulnerabilities Program Use Case Design
This topic explains the IT Security Vulnerabilities Program use case design.
On this page
Architecture Diagram
The following diagram shows applications in relation to the IT Security Vulnerabilities Program (ITSVP) use case.
Applications
Application |
Description |
---|---|
Devices |
The Devices application serves as a central repository for knowledge, such as criticality, about IT devices and which applications they support. You can manage devices to ensure that they are protected according to management expectations. The application is also associated with other aspects of the enterprise infrastructure. Note: The Devices application is included in the Enterprise Catalog package. |
Vulnerability Tickets |
The Vulnerability Tickets application provides a method of creating and assigning tickets to specific vulnerability scan results. The application allows tickets to be assigned to a specific owner, who has 1 of 4 ways for addressing a ticket:
Each ticket includes information from the vulnerability scan result and related devices, as well as patches used to complete simple remediation. Metrics automatically tracked by the ticketing application include the number of days open, ticket status, scanner verification, and the status of associated vulnerability scan results. |
Vulnerability Scan Results |
The Vulnerability Scan Results application stores the issues that result from every new record that is created from the vulnerability scanner such as Device Name, IP, owner, department, description, notes, recommendations, and much more. These records contain the technical recommendation for each scan result and allow for reporting on the total number of issues, regardless of which system detects it. |
Vulnerability Historical Data |
The Vulnerability Historical Data application provides a method for monitoring historical trends in the Vulnerability Scan Results application. The following metrics are recorded and tracked:
The vulnerability scan results are grouped into the following dimensions:
Records in the Vulnerability Historical Data application represent a snapshot of a point in time for a specific dimension and device. Information is populated into Vulnerability Historical Data on a daily basis through a data feed that aggregates statistical data from the Vulnerability Scan Results application. Important: The VSR Overall Status and Severity fields located in the Vulnerability Scan Results application are closely tied to the data feeds for Vulnerability Historical Data. Altering the values or configuration of those fields could lead to the data feed not functioning properly, or a loss of data transfer. |
Applications |
The Applications application stores all software applications used by the organization to perform business operations. You can view how an application is used, the people that use it, and the devices on which the application is installed. You can also track the business impact, customer impact, and licensing details, and associate it with other aspects of the enterprise infrastructure. Note: The Applications application is included in the Enterprise Catalog package. |
Business Unit |
The Business Unit application provides a detailed view of all activities related to the specific business unit. Note: The Business Unit application is included in the Enterprise Catalog package. |
Vulnerability Scan Definition |
The Vulnerability Scan Definition application documents recurring or 1-time vulnerability scans for reporting purposes. Vulnerability scans can be conducted on a regular or periodic basis as part of the threat management program, for example, Quarterly PCI Scans or scans of externally facing servers. Vulnerability Scans can also be conducted on a "transactional" basis for a singular purpose, such as an application scan or as part of a threat assessment. Through the Vulnerability Scan Definition application, you can:
|
Vulnerability Library |
The Vulnerability Library application represents a catalog of vulnerability data collected from Archer Exchange integration offerings. The Vulnerability Library is updated each week or month by data feeds depending on the source. The library includes data points such as:
Records can be linked to affected devices, vulnerability scan results, and malicious code found to exploit the vulnerability. The Vulnerability Library also provides a method for generating exception requests, identifying mitigating strategies, and denoting affected ports. By tying vulnerabilities to assets, you can properly analyze, prioritize, and respond proactively to address the threat for vulnerable assets. The Vulnerability Library provides the ability to:
|
Patches |
The Patches application contains patch information that is populated from threat feeds. |
Technologies |
The Technologies application provides a searchable and extensible repository of technology version information that can be leveraged to relate devices of like technology. Devices can be identified and grouped using 1 of the 3 tiered hierarchical values lists detailed:
Users can filter technologies that have been company approved and view reports detailing known vulnerabilities threatening their technologies. Note: The Technologies application is included in the Enterprise Catalog package. |
Vulnerability Scan Requests |
The Vulnerability Scan Request application allows you to request a vulnerability scan on a particular device, application, network segment, or IP range. The application includes fields to document the request including requestor and manager information, scope of scan, date/time, type of scan, and priority. |
Malicious Code |
The Malicious Code application collects malware data regarding worms, Trojans, rootkits, spyware, crimeware, viruses, and other hostile or intrusive program code. By tying malicious code to asset data, you can properly analyze, prioritize and determine the required remediation based on asset criticality rating. Through the Malicious Code application, you can:
|
Findings |
The Findings application allows you to document issues, deficiencies, or gaps found through assessments and control testing. Findings are either auto-generated from questionnaires, including links back to the questionnaire, target, and any applicable control standards and authoritative sources, or are manually generated by users. Findings can be resolved through remediation tasks and/or exception requests. Through the Findings application, you can:
|
Exception Requests |
The Exception Requests application allows you to manage the process of granting, denying, and expiring exceptions to the remediation required in a finding. Through built-in workflow, the application ensures that all exceptions are properly reviewed. The tool can also report on exceptions across the enterprise, monitoring them by control, department, or severity. Through the Exception Requests application, you can:
|
Remediation Plans |
The Remediation Plans application allows you to document the specific actions management plans to take to address identified gaps and issues. You can capture key details about remediation efforts, including estimated and actual costs, timelines, owners and detailed actions. You can associate multiple remediation plans with a single finding and track each effort individually. You can also relate a single remediation plan with multiple findings in the event that an action is designed to address multiple issues. |
Storage Devices |
The Storage Devices application serves as a central repository for storage devices used within the infrastructure. Note: The Storage Devices application is included in the Enterprise Catalog package. |
Company |
The Company application stores general, financial, and compliance information at the company level. Combined with the Division and Business Unit applications, this application supports roll-up reporting of governance, risk, and compliance initiatives across the enterprise. Note: The Company application is included in the Enterprise Catalog package. |
Division |
The Division application represents the intermediate unit within the business hierarchy which is a layer below the high-level company and a layer above the individual business unit. You can use this application to further document the relationships within your business and measure the effectiveness and compliance of individual divisions within the enterprise. Note: The Division application is included in the Enterprise Catalog package. |
Vulnerability Reference Lists |
The Vulnerability Reference Lists application provides a repository of public vulnerability references collected from Archer Exchange integration offerings, based on what vendor you are using to scan. The Vulnerability Reference List is updated based on a user-defined schedule to account for emerging threats. The application provides a list of entries, each containing a vulnerability identification number, a type, and a public reference for known Cyber Security vulnerabilities. The URL found in the application contains a list of public references detailing information about the vulnerability, such as a description, consequences of the vulnerability, and potential mitigation strategies. |
Access Roles and Record Permissions
Access Role |
Description |
---|---|
ITSVP: Analysts |
This role provides the appropriate access levels to Analysts within the ITSVP use case to perform analysis and classify vulnerabilities accordingly. |
ITSVP: Operations |
This role provides the appropriate access levels to Operators within the ITSVP use case. |
ITSVP: Executive Management |
This role establishes the rights for Executive Management within the ITSVP use case. Users with this role are provided with read access to ITSVP applications. |
ITSVP: Business Management |
This role provides access levels to the appropriate line of business within the ITSVP use case. |
ITSVP: Admin |
This role serves as the administrator for the ITSVP use case, providing create, read, update, and delete access rights. |
Note: For detailed, page-level access rights, see the Data Dictionary.
Dashboards
Dashboard |
Description |
---|---|
ITSVP Business and Executive Management |
The ITSVP Business and Executive Management dashboard provides a high-level overview of the ITSVP use case. This dashboard displays information about vulnerability scan results, devices, and vulnerability tickets. Users can also sort vulnerability remediation plans, findings, and exception requests by status to see which ones are in progress, closed, approved, or expired. Only users assigned to the ITSVP: Business Management or ITSVP: Executive Management roles can view the ITSVP Business and Executive Management dashboard. |
ITSVP Analyst |
The ITSVP Analyst dashboard provides information about the severity and status of vulnerability definitions and vulnerability scan results. This dashboard organizes vulnerability definitions by month to help Analysts draw comparisons. Analysts can also view open vulnerability tickets assigned to them. Only users assigned to the ITSVP: Analyst role can view the ITSVP Analyst dashboard. |
ITSVP Operations |
The ITSVP Operations dashboard provides information about vulnerability scan results and vulnerability tickets by status. Users assigned to the Operations role can use this dashboard to view open vulnerability tickets that are assigned to them, and see which devices are associated with their open vulnerability scan results. This dashboard also highlights expiring vulnerability exception requests. Only users assigned to the ITSVP: Operations role can view the ITSVP Operations dashboard. |
Data Feeds
Data Feed |
Description |
---|---|
Vulnerability_Historical_Data.dfx5 |
The Vulnerability Historical Data data feed captures metrics populated in Vulnerability Scan Results into the Vulnerability Historical Data application. The data feed is based on multiple statistical reports and captures the following metrics for each vulnerability scan record:
If a device is tied to multiple dimensions or dimension values, the aggregated reports in the Vulnerability Historical Data application will reflect the same scan result multiple times. Important: The Vulnerability Historical Data data feed is only available in the English language. |
Available Integrations
The IT Security Vulnerabilities Program use case has several integrations available on Archer Exchange that allow you to feed vulnerability data into Archer.
Note: You are not required to install any integrations to use the ITSVP use case.
Integration |
Description |
---|---|
NIST National Vulnerability Database (NVD) |
The NIST NVD integration does the following:
For more information about NIST NVD, including how to set up the integration data feeds, see "NIST National Vulnerability Database Integration" on the Archer Exchange at https://www.archerirm.community/t5/exchange-overviews/nist-national-vulnerability-database-integration/ta-p/564705. |
Qualys Vulnerability Management |
The Qualys Vulnerability Management integration does the following:
For more information about Qualys, including how to set up the integration data feeds, see "Qualys Vulnerability Management Integration" on the Archer Exchange at https://www.archerirm.community/t5/exchange-overviews/qualys-vulnerability-management-integration/ta-p/573408. |
Tenable.sc Vulnerability Management |
The Tenable.sc Vulnerability Management integration does the following:
For more information about Tenable.sc, including how to set up the integration data feeds, see "Tenable.sc Vulnerability Management Integration" on the Archer Exchange at https://www.archerirm.community/t5/exchange-overviews/tenable-sc-vulnerability-management-integration/ta-p/573423. |
RiskRecon Own Enterprise Monitoring |
The RiskRecon Own Enterpise Monitoring integration allows you to independently monitor your own enterprise's external security posture. This integration provides organizations with visibility, insight, and actionable intelligence into risk environments. For more information about RiskRecon Own Enterprise Monitoring, including how to set up the integration data feeds, see "RiskRecon Own Enterprise Monitoring Integration" on the Archer Exchange at https://www.archerirm.community/t5/exchange-overviews/riskrecon-own-enterprise-monitoring-integration/ta-p/571193. |
Data Dictionary
The IT Security Vulnerabilities Program Data Dictionary contains configuration information for the use case.
You can obtain the Data Dictionary for the solution by contacting your Archer Account Representative.