Vulnerabilities
The Vulnerabilities page in CyberGuard.ai serves as the central repository for identifying, documenting, and monitoring weaknesses that could compromise your organization’s security posture. It enables users to catalog discovered vulnerabilities, assess their severity, and track remediation efforts through associated controls and mitigation tasks. By maintaining a structured view of all known vulnerabilities, this page helps organizations proactively address risks, strengthen defenses, and maintain compliance with cybersecurity frameworks.
Usage Notes
Vulnerability Overview and Management
Each record includes key details such as Reference ID, Name, Status, Severity, Applied Controls, Domain, and Labels.
Use the Search bar or Filters panel to locate specific vulnerabilities by name, severity, or control type.
Adjust the number of visible records using the Show Entries dropdown for easier review.
Severity and Status Tracking
The Severity column categorizes vulnerabilities based on impact level (e.g., Low, Medium, High, Critical).
The Status field reflects remediation progress — such as Open, In Progress, or Resolved — for continuous monitoring.
Applied Controls Integration
The Applied Controls column links each vulnerability to existing security measures that mitigate its impact.
This allows teams to validate control effectiveness and identify where additional actions may be needed.
Domain and Labeling for Organization
Vulnerabilities can be tagged to specific domains or business units for improved traceability.
Use Labels to categorize vulnerabilities by type, system, or remediation priority.
Benefits
Centralizes all identified vulnerabilities in one structured repository.
Enhances visibility into weaknesses affecting different business domains.
Supports proactive remediation through linked controls and task management.
Strengthens compliance alignment with frameworks like ISO 27001, NIST, and SOC 2.
Improves overall risk posture by reducing exposure to exploitable weaknesses.
Related Pages
Risk Assessments – Evaluate and quantify risks associated with identified vulnerabilities.
Risk Scenarios – Link vulnerabilities to real-world attack scenarios and threat models.
Applied Controls – Review the effectiveness of existing controls mitigating known vulnerabilities.
Tasks – Track remediation actions assigned to resolve vulnerabilities.
Incidents – Cross-reference vulnerabilities involved in active or past security incidents.

Last updated