0
7.0.1
Zurich, Yokohama, Xanadu, Washington DC, Vancouver, Utah
Import security data from service graph connectors so that you can audit your enterprise assets based on policies for security gaps. IT and security teams can view imported data on dashboards in the Security Posture Control Workspace. Automatically prioritize and assign the security gaps you discover to IT and security teams for remediation with the workflow in the Configuration Compliance application.
- Create and define asset profiles to monitor different categories of devices with your SPC policies.
- Search for assets that match conditions you set with the asset search feature.
- Build policies that suit your requirements using a policy builder that supports filters for asset types, connections, and properties.
- View data and configure security findings in the Security Posture Control workspace.
- Build on an existing policy as a base so you automatically inherit its conditions in your new policy.
- Ignore the results of certain policy conditions with the policy exclusion feature if you're using more than one policy for queries.
- Activate use cases and policies included with the application to get you started quickly.
- Build your own custom insights based on policies.
- New
- "last discovered" from the cmdb_multisource_data table is available in the policy condition builder.
- Fixed
- Aggregated host name is correctly mapped and populated from multi-source data.
- Reported by count is no longer undefined for software assets in the Findings form UI.
- Dependencies
- Configuration Compliance