SecurityCenter Dashboards

CVSS Base Risk Host Matrices

by Cody Dumont
April 10, 2014

CVSS Base Risk Host Matrices Screen Shot
When performing a detailed risk analysis, the use of risk matrices is a common practice. The Forum of Incident Response and Security Teams (FIRST) created the Common Vulnerability Scoring System (CVSS) system to normalize the methodology of analyzing risk. The CVSS provides the open framework for assessing the risk of discovered vulnerabilities. The scoring system has three metric types, the first being “Base Metric”. This dashboard is comprised of four risk analysis matrices. The top two matrices provide analysis of hosts with vulnerabilities with the respective CVSS metric, while the bottom two provide analysis of the percentage of total hosts that are found to have the designated risk level.

NetFlow Monitor Dashboard

by Josef Weiss
April 8, 2014

This dashboard displays event statistics leveraging the capabilities of Tenable Netflow Normalized Events. This event data is correlated to produce a series of pie charts, tables, and trends lines to display statistical data.

Netflow data that is being forwarded to Tenable’s LCE includes ports, source and destination IP address. The components in this dashboard include:

Top Talkers Class B (All Traffic)

CVSS Base Risk Matrices

by Cody Dumont
April 3, 2014

CVSS Base Risk Matrices Screen Shot
The Common Vulnerability Scoring System (CVSS) provides the open framework for assessing the risk of discovered vulnerabilities. The scoring system has three metric types, the first being “Base Metric”. This dashboard provides risk analysis matrices and trend lines showing the change in risk over 25 days.

PCI Status

by Josef Weiss
March 25, 2014

This dashboard leverages Nessus PCI system configuration results to track which PCI controls are compliant or non-compliant. As such, a PCI Audit Policy must be used to achieve results. Audit files are available for download via the Tenable Support Portal for a variety of operating environments.

Council on CyberSecurity 20 Critical Security Controls Dashboard

by Cody Dumont
March 14, 2014

CSC Top 20 Dashboard
This dashboard displays many indicators of the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to protect assets, infrastructure, and information by strengthening your organization’s defensive posture through continuous automated protection and monitoring. This SecurityCenter Dashboard is comprised of one dashboard with 15 individual components that provide insight to nearly 50 items that directly correlate to the Council on CyberSecurity 20 Critical Security Controls.

Cybersecurity Asset Management

by Cody Dumont
March 13, 2014

 Cybersecurity Asset Management Screen Shot
Security professionals are often blindsided by some new corporate regulation or industry regulation, which a company has to be compliant with. For the users of SecurityCenter CV, this is not as big of an issue, as the data may already exist and the components to collect the data may also be developed. With the recent release of the Cybersecurity Framework, there are 22 categories, and numerous subcategories. This dashboard is the first of many to come that illustrate how to use previously developed components to meet new reporting requirements.

PVS Trust Relationships

by Josef Weiss
March 11, 2014

This dashboard presents trust relationships between clients and servers that have been passively gathered via PVS plugins 3 and 15. These plugins collect data on internal client trusted client connections and internal server trusted connections. Results are sorted by TCP port and displayed in a series of matrix indicators within the individual components. Viewing plugin output provides insight into devices that are establishing trusted connections to each other.

Pages