Overview of Vulnerabilities

Technology assets added to the scope of vulnerabilities for the project are listed on this page, where the vulnerabilities associated with them can be processed and viewed. This list of assets must be processed in order to obtain the latest information from the scanners integrated with the system or imported manually through spreadsheets, as well as for the Risk Score to be calculated for each vulnerability and consolidated for each asset. Processing the list essentially means taking a "snapshot" of the latest information from the scanners.

Assets can be processed as many times as needed to ensure that only the latest, most accurate information will be used in the evaluation and treatment phases. However, once the analysis of a certain asset or the entire analysis phase is closed, you will no longer be able to process the assets. Note that if the relevance of an asset is changed in the Organization module, the Risk Score will only be recalculated once the asset is reprocessed.