Skip to main content

Vendor - Risk History

Learn how to use the Risk History dashboard to get a clear view of all misconfigured controls across your vendors.

Updated over a month ago

Overview of the Risk History Dashboard

  • The Risk History tab provides a log of all past and present security findings for a specific vendor. This gives you a clear and historical view of their security posture.

  • The dashboard helps you understand trends, identify recurring issues, and track remediation efforts.

  1. Risk Severity Summary:

    • At the top of the page, you'll see a summary of the total number of findings categorized by severity: Critical, High, Medium, and Low.

    • This provides a quick snapshot of the current state of the vendor's security posture and the distribution of risk.

  2. Risk Details Table:

    • The main table lists all the individual findings. Each row represents a specific security issue.

    • Finding: A concise description of the security issue (e.g., "Revoked certificate in use," "DMARC policy is private").

    • Risk: A description of the potential risk associated with the finding (e.g., "Susceptible to man-in-the-middle attacks," "Emails can be fraudulently sent").

    • Category: The security category the finding belongs to (e.g., Encryption, Email, Website).

    • Status: The current status of the finding (e.g., Passed, In Remediation, Failed).

    • Assets: The number of assets affected by this finding.

    • First Detected: The date when the finding was first identified.

  3. Using the Dashboard:

    • Prioritize: Use the severity summary to focus on the most critical risks first.

    • Track Remediation: Monitor the "Status" column to see which issues have been addressed and which are still pending.

    • Investigate: Click on any finding to view its detailed history and additional information.


Accessing Risk Details

  • From the Risk History dashboard, click on any finding to open the detailed risk view, as shown in the visual.

  • This detailed view provides all the information you need to understand, communicate, and manage a specific security risk.

  1. Risk Details Panel:

    • Finding: A clear heading describing the issue (e.g., "SSL not available").

    • Manage: The "Manage" button allows you to take actions, such as updating the status of the finding or assigning it to a team member.

    • Severity: The severity level of the risk (e.g., "Critical").

    • Category: The security category it falls under (e.g., "Encryption").

    • First Detected: The date when the issue was first found.

    • Assets Affected: The number of assets impacted by this risk.

    • Status: The current status of the finding (e.g., "Failed").

  2. Detailed Information Sections:

    • Summary: Provides a detailed, technical explanation of the finding, its potential impact, and why it is a security concern.

    • Risk Details: Offers a more in-depth description of the risk, its potential consequences, and what it means for your organization.

    • Recommended Remediation: Suggests specific steps or actions that the vendor can take to fix the issue. This is crucial for guiding the remediation process.

    • Affected Assets: Lists the specific domains, subdomains, or IP addresses that are impacted by this finding. This helps the vendor pinpoint exactly where the problem lies.

  3. Taking Action:

    • Use this detailed information to create a remediation plan with your vendor.

    • Share the recommended remediation steps directly with them to help them address the issue efficiently.

Did this answer your question?