by Carole Fennelly
April 4, 2022

Information Security Managers often face a difficult choice of what problem to solve first. With operational commitments conflicting with security risks from software vulnerabilities, do they apply the patch or take some focus on operations? This dashboard helps managers understand prioritize vulnerabilities remediation.
If the main objective of patch management is to create a consistently configured environment that mitigates known vulnerabilities and cyber risks, then the purpose of a vulnerability management system is to identify the vulnerabilities and cyber risk need to be remediated or mitigated. The method of scanning statically deployed systems located within the borders of the network, is no longer sufficient. There is a gap in the way risks are detected, where they reside, and if they can be scanned.
Managers are often required to work within a change control program for mitigation strategies. As the size of the organization grows, so does the complexity of applying patches and mitigating risks. The change management program requires a lot of detailed information about the patch that is being applied, such as severity, CVE, and other related information. Managers are required to look for this information in multiple locations. Tenable.io uses this dashboard to correlate vulnerability information into a single location. The tables and charts in this dashboard provide the most critical vulnerabilities grouped using multiple metrics that matter most to managers.
Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture.
Widgets
Most Common Ports - This widget displays which network ports have been open the most during scans. Knowing which ports have been opened most gives managers a view into network traffic lanes and provides a strong overview of an organization’s network attack surface.
Most Common CVEs - This widget shows vulnerability CVE percentages, enabling managers to properly measure workload based on the remediation requirements for the most prevalent CVEs. Many CVEs span multiple operating systems or applications, and require specific mitigation efforts. Knowing the prevalence of particular vulnerabilities facilitates mitigation planning.
Most Common Operating Systems - This widget displays a percentage of the different operating systems found within the environment, assisting managers with task and remediation planning. Managers can use this information to determine the effort required based on asset volume when creating remediation tasks.
Most Vulnerable Linux Hosts - This widget displays the top ten most vulnerable Linux/Unix systems, sorted by total vulnerabilities. This host analysis assists managers in measuring risk and prioritizing remediation tasks. Managers can provide a clear directive based on analysis of the detected vulnerabilities. As remediation tasks are completed, this table will continually display the most vulnerable Linux and Unix systems, even down to a low severity level.
Most Vulnerable Windows Hosts - This widget displays the top ten most vulnerable Windows systems, sorted by total vulnerabilities. This host analysis assists managers in measuring risk and prioritizing remediation tasks. Managers can provide a clear directive based on analysis of the detected vulnerabilities. As remediation tasks are completed, this table will continually display the most vulnerable Windows systems, even down to a low severity level.
Top MS Bulletins - This widget displays the number of vulnerabilities detected that are grouped by Microsoft Knowledge Base (KB) articles, Security Rollups, and Bulletin IDs. In addition, there are rollup patches released each patch cycle. All of this critical information enables managers to prioritize patch deployment efforts and provide direction to operation teams.