Skip to main content

Security Risk Breakdown

About the Data

Data Refresh Frequency: Updated daily at 1:00 pm UTC

Displays Data for: All open violations after January 1, 2022 and resolved violations (waived/fixed) on or after January 1, 2024. For new installations, data will be visible within a week after the first scan.

For versions 184 through 187, the dashboard shows data generated from the time of upgrade (to 184) to present. To view all historical data, upgrade to version 188 or later.

Minimum Requirements: Applications must be scanned at least once, after upgrade to version 184. The dashboard currently shows data related to violations and remediations that are discovered after upgrade to version 184.

Overview

The Security Risk Breakdown dashboard provides insights into the distribution of vulnerabilities along with the associated severity, within each application. It enables developing a targeted remediation approach and defining a plan that maintains a low-risk security risk profile and assists in passing compliance checks that strictly restrict critical vulnerabilities for your applications.

You can use the Security Risk Breakdown dashboard to reveal applications with most risk and prioritize remediation of the vulnerabilities based on the threat level, stage, application category and type of violations (legacy/non-legacy violations.)

By analyzing the The Top 10 Violations Fixed, you can assess the effectiveness of your remediation strategy over the selected time period. By prioritizing remediation of the most common vulnerabilities and CWEs, you can mitigate the security risks faster.

The Security Risk Breakdown simplifies the identification of policy violations by grouping them under the Top 5 categories of:

Get to Know Your Security Risk-Breakdown Dashboard

The interactive dashboard provides multiple filter options to view the security risks in your applications. You can filter on date range, organization, application, application category, policy threat level, stage, violation type, security policy name, component type and remediation status.

The breakdown offers insights into the change in state (from open to waived/fixed) of a violation, over a period of time. For example, for a selected date range covering April 2 to April 10, you can view:

  1. a violation that was first detected or had a state "open" in January and was "fixed" in May.

  2. a violation that was first detected or had a state "open" in February, was "waived" on April 5 and fixed in May.

  3. a violation that was first detected or had a state "open" in April 3 and was "fixed" on April 9.

Violation Types available for filtering are Legacy Violations and Non-Legacy Violations.

Remediation Statuses available for filtering are fixed, open and waived.

Stages available for filtering are release, stage-release, build, compliance and source. The build stage is selected by default.

SRA_filter_violation_type.png

Top Ten Violations Fixed

Top_10_Violations-SR_breakdown.png

The chart displays the number of applications containing the fixed and pending violations for the top ten most frequently occurring vulnerabilities (X-axis) found in your applications.

The distribution of the top ten violations that were fixed in the various applications gives an insight into the existing security risk. Since these Top 10 vulnerabilities occur in many applications, remediating them has high impact.  This chart shows how complete those remediation efforts are.  The blue bars show the count of successfully remediated vulnerability instances and the pink bars show the remediation work remaining.

Click on the CVEs on the X-axis to view the detailed description of the vulnerability. Ensure that the base url is configured for your instance of IQ Server to view the vulnerability details. You may observe a change in the severity for a given CVE. This is due to the change in the CVSS score that associated with the CVE, over the course of time.

Top 5: Applications with Most Risk

Top_5_apps_with_most_risk.png

The chart displays the number of vulnerabilities and the associated threat levels for the 5 applications that have the most total risk. Any business critical applications on this list are good targets for focused risk reduction efforts.”

The top 5 ranking of the Applications with Most Risk is determined by the combination of the threat levels and the number of vulnerabilities. There could be scenarios where the number of vulnerabilities are higher, but the application is not shown at a higher risk, in the the Top 5 rankings. This is because of the lower threat levels associated with the vulnerabilities.

Top 5: Most Common Vulnerabilities

Top_5_vulns.png

The chart displays the vulnerabilities in your applications and is color coded by threat level. By determining the most commonly occurring vulnerabilities across your applications, you can direct your remediation efforts towards these vulnerabilities and reduce the risk efficiently. The number of applications displayed here shows the distinct count of the applications containing the vulnerability.

The top 5 ranking of the Most Common Vulnerabilities is determined by the combination of the number of vulnerabilities and impacts on the number of applications. There could be scenarios where the number of applications are higher, but the vulnerability is not shown higher in the the Top 5 rankings. This can happen if the vulnerability occurs in many applications but some of those occurrences have lower-severity impact.

Click on the CVEs on the Y-axis to view the detailed description of the vulnerability. Ensure that the base url is configured for your instance of IQ Server to view the vulnerability details.

Top 5: Components with Most Risk

top_5_components.png

The chart displays the 5 most commonly implicated components along with the associated threat levels. You can target remediation of "critical" and "severe" threat levels to optimize the remediation or risk reduction tasks.

The top 5 ranking of the Components with Most Risk is determined by the combination of the number of vulnerabilities and impacts on the number of applications. There could be scenarios where the number of applications are higher, but the component is not shown higher in the the Top 5 rankings. This is because the chart shows the number of applications that have been impacted by all threat levels that were associated due to changes of CVSS over the time period.

Top 5: CWEs

Top_5_CWEs.png

The chart displays the 5 most commonly found cataloged CWEs and the number of affected applications. You can remediate risks based on the weakness taxonomy, and the number of applications affected, by crafting a targeted approach that focuses on certain weakness types.

The top 5 ranking of the CWEs is determined by the combination of the number of CWEs and impacts on the number of applications. There could be scenarios where the number of applications are higher, but the vulnerability is not shown higher in the the Top 5 rankings. This can happen if the vulnerability occurs in many applications but some of those occurrences have lower-severity impact.

Click on the CWEs on the Y-axis to view the detailed description on cwe.mitre.org

NOTE: "No CWE Assigned" indicates that no CWE has been officially assigned to the vulnerability because it is new or uncategorized.

Vulnerabilities

Vulnerability_Register_Fix_col.png

This table shows a list of all vulnerabilities found in the latest application scans.

Analyze the security risk breakdown of a CVE/Sonatype Vulnerability

Click on a vulnerability ID from a row in the Vulnerabilities table to select a vulnerability ID. The Violation Status table below will display all applications, the name of the implicated component, the threat level and remediation status.

The other charts on the dashboard will reflect visualizations for data corresponding to the selected vulnerability ID.

Click on a Vulnerability ID to view data corresponding to this vulnerability ID in other visualizations on the dashboard. The Violation Status table will display the application names, implicated component name, threat level and remediation status for the selected vulnerability ID.

NOTE: Due to limitations of the data visualization platform, this table can show 5,000 rows only. This also applies to the exported data.

Table column

Description

Vulnerability ID

Published vulnerability identifier

Links to Vulnerabilties Details in Lifecycle if base url is configured for your instance.

Threat Level

Assigned threat level

Application Count

Number of applications impacted

Component Count

Number of components implicated by the vulnerability

Open Violation Total

Total number of open violations (which are not remediated) due to the vulnerability

Waived Violation Total

Total number of violations due to the vulnerability that are waived

Fixed Total

 

Total number of component fixes (upgrade/downgrade/removal) implemented to remediate the vulnerability.

Violation Status

Violation_status_table.png

This table shows the violation status including discovered dates, resolved dates and current fix status for the implicated component and the corresponding application in which the violation occurs.

NOTE: Due to limitations of the data visualization platform, this table can show 5,000 rows only. This also applies to the exported data.

Table column

Description

Application

Name of the application containing the vulnerability

Component

Name of the implicated component

Vulnerability ID

Published vulnerability identifier

Links to Vulnerabilties Details in Lifecycle if base url is configured for your instance.

Threat Level

Most recent threat level assigned to the vulnerability

If the threat level of a vulnerability was previously categorized as "Critical" but later downgraded to "Severe", the threat level will display "Severe".

Discovered

Date when the violation was first detected during application scans

Resolved

Date when the violation was either fixed or waived

Status

Current status of the violation (open/fixed/waived)

Troubleshooting

Problem

Clicking on the browser Refresh button may give you the following error:

Message displaying that an error occurred loading the Data Insight.

Solution

Click the Back button on your browser, from the page where you see this error, to go back to the Landing page Enterprise Reporting. Select the dashboard you want to view, to reload the visualizations.

To refresh the page, click on the refresh icon on the top right, instead of the Refresh button on your browser.

refresh_page.png

Problem

No data visible on the dashboard or any other issues with the dashboard.

Solution

Click on Copy to Support Info to Clipboard button and contact support support with this information.

copy_support_to_clipboard.png