Solutions and Applications
...
Using Vulnerability Response M...
Vulnerability Case Management
1 min
the vulnerability case management process centralizes the tracking, management, and resolution efforts for vulnerabilities it offers a streamlined approach to address grouped findings, create actionable remediation items, and monitor the resolution lifecycle effectively below is a detailed breakdown of the process, its components, and actions key features of vulnerability case management vulnerability findings table displays detailed information about findings, including tracking id unique identifier for each finding unique id unique id for the finding, comprised of vulnerability id and asset identifier primary asset identifier specifies the affected asset turbine risk score numerical risk score for prioritizing remediation asset remediation owner the owner in question for the indicated finding status tracks whether the finding is open, resolved, or in exception create vulnerability remediation items grouping and flow automation offers insights into how findings were grouped and addressed automatic grouping and remediation automates both grouping and remediation item creation automatic grouping groups findings but requires manual remediation item creation manual requires manual grouping and remediation item creation