Using IT Security Vulnerabilities Program
The Archer IT Security Vulnerabilities Program use case supports the following processes.
On this page
Managing Scan Results
The main workflow for the IT Security Vulnerabilities Program use case collects device scan data from multiple sources and cross-references that data against the known vulnerabilities. Ticketing for vulnerabilities found in the device scan data occurs through both automated and manual processes. Once a vulnerability ticket is assigned to the appropriate IT admin, the IT admin can resolve it in several ways.
Managing Asset Discovery
If you have the IT Risk Management use case licensed, you can complete tasks to manage asset discovery. As new assets are added into the Vulnerability Library application by the IT Security Vulnerabilities Program data feeds, those assets must be assigned an owner. The asset owners can then fill out the Device, Application, and Business Impact assessments to provide a baseline risk rating to be used throughout the use case.