0
1.0.3
Xanadu, Washington DC, Vancouver
Mitigation controls monitoring automatically detects mitigation controls of various types as described by MITRE on all on-premise and cloud enterprise assets.
These mitigation insights can be used to automatically reduce the risk score of vulnerable items in Vulnerability Response.
The following use cases are supported:
- Mitigation control policies included with the application that identify MITRE mitigations on assets.
- Identify if your assets have Web Application Firewall (WAF) protection.
- Automatically map the WAF mitigation to vulnerable items by analyzing the policy signatures in the firewall and the Common Vulnerabilities and Exposures (CVE) information.
- Identify exploit mitigation controls from endpoint protection or Endpoint Detection and Response (EDR) tools like CrowdStrike.
- Automatically map the EDR exploit mitigation controls to relevant vulnerable items by analyzing the vulnerability information and the EDR mitigation control configuration.
- Populate vulnerable items with relevant attributes that can be used in your Vulnerability Response risk calculator rules.
- Monitor assets for internal security compliance standards by creating custom mitigation control policies using advanced configuration data from EDR tools.
- View a mitigation controls summary on the dashboard and drill down to see the underlying assets.
- Supported Web Application Firewall tools include F5 Big-IP.
- Supported Endpoint Protection or EDR tools include CrowdStrike.
- New
- Initial Release
Dependencies
- Security Integration Framework
- Security Support Common
- Vulnerability Response Common