SecurityCenter Dashboards

PVS Trust Relationships

by Josef Weiss
March 11, 2014

This dashboard presents trust relationships between clients and servers that have been passively gathered via PVS plugins 3 and 15. These plugins collect data on internal client trusted client connections and internal server trusted connections. Results are sorted by TCP port and displayed in a series of matrix indicators within the individual components. Viewing plugin output provides insight into devices that are establishing trusted connections to each other.

Cybersecurity Framework Audit Dashboards

by Cody Dumont
March 4, 2014

Cybersecurity Framework Audit Summary
SecurityCenter and Nessus have the ability to check compliance status using the audit files. With native flexibility of all Tenable products, SecurityCenter is able to report on the compliance status of the Cybersecurity Framework using the compliance data previously collected. This dashboard provides two views of compliance data. One view includes ration bars indicating ratio of checks to status of the check. The other data set shows a matrix of the compliance check status.

Compliance Summary

by Cody Dumont
February 20, 2014

Compliance Summary Screen Shot
SecurityCenter and Nessus have to ability to check compliance with a variety of standards including HIPAA, NIST 800-53, PCI DSS, and DoDI 8500.2. This dashboard shows the security manager a summary of the current compliance status.

CVE Analysis

by Josef Weiss
February 18, 2014

This dashboard trends outstanding CVE, and recently mitigated issues in a variety of tables and trend lines. It builds on a previously released dashboard title CVE Trending By Year.

Required Tools - Nessus or PVS

This dashboard leverages SecurityCenter's ability to filter vulnerabilities based on the specific year of the associated CVE ID for it.

There are four components of this dashboard.

Event Vulnerabilities

by Cody Dumont
February 13, 2014

Event Vulnerabilities Screen Shot
This dashboard highlights the vulnerabilities discovered from the events collected from the Log Correlation Engine (LCE). Using exploitable vulnerability and vulnerability trending graphs, this dashboard helps security managers identify vulnerabilities without scanning the remote systems.

Pages