Skip to content

Commit fc8173f

Browse files
authored
Merge pull request #261528 from danielledennis/main
Product updates
2 parents 3f19333 + 3a42bd6 commit fc8173f

File tree

4 files changed

+10
-0
lines changed

4 files changed

+10
-0
lines changed
329 KB
Loading
454 KB
Loading
194 KB
Loading

articles/external-attack-surface-management/understanding-dashboards.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Defender EASM provides five dashboards:
1919
- **Security posture**: this dashboard helps organizations understand the maturity and complexity of their security program based on the metadata derived from assets in your Approved inventory. It is comprised of technical and nontechnical policies, processes and controls that mitigate risk of external threats. This dashboard provides insight on CVE exposure, domain administration and configuration, hosting and networking, open ports, and SSL certificate configuration.
2020
- **GDPR compliance**: this dashboard surfaces key areas of compliance risk based on the General Data Protection Regulation (GDPR) requirements for online infrastructure that’s accessible to European nations. This dashboard provides insight on the status of your websites, SSL certificate issues, exposed personal identifiable information (PII), login protocols, and cookie compliance.
2121
- **OWASP Top 10**: this dashboard surfaces any assets that are vulnerable according to OWASP’s list of the most critical web application security risks. On this dashboard, organizations can quickly identify assets with broken access control, cryptographic failures, injections, insecure designs, security misconfigurations and other critical risks as defined by OWASP.
22+
- **CWE top 25 software weaknesses**: this dashboard is based on the Top 25 Common Weakness Enumeration (CWE) list provided annually by MITRE. These CWEs represent the most common and impactful software weaknesses that are easy to find and exploit.
23+
- **CISA known exploits**: this dashboard displays any assets that are potentially impacted by vulnerabilities that have led to known exploits as defined by CISA. This dashboard helps you prioritize remediation efforts based on vulnerabilities that have been exploited in the past, indicating a higher level of risk for your organization.
2224

2325
## Accessing dashboards
2426

@@ -278,6 +280,14 @@ This dashboard is based on the Top 25 Common Weakness Enumeration (CWE) list pro
278280
[![Screenshot of CWE Top 25 Software Weaknesses dashboard.](media/dashboards-28.png)](media/dashboards-28-expanded.png#lightbox)
279281

280282

283+
## CISA Known Exploits
284+
285+
While there are hundreds of thousands of identified CVE vulnerabilities, only a small subset has been identified by the Cybersecurity & Infrastructure Security Agency (CISA) as recently exploited by threat actors. This list includes less than .5% of all identified CVEs; for this reason, it is instrumental to helping security professionals prioritize the remediation of the greatest risks to their organization. Those who remediate threats based on this list operate with the upmost efficiency because they’re prioritizing the vulnerabilities that have resulted in real security incidents.
286+
287+
![Screenshot of CISA Known Exploits dashboard.](media/dashboards-29.png)
288+
289+
290+
281291

282292
## Next Steps
283293

0 commit comments

Comments
 (0)