The Ortelius PDVD provides a production-grade security posture dashboard focused on post-deployment vulnerability management. Unlike traditional pre-deployment scanning, this system continuously monitors what's actually running in production environments and tracks remediation effectiveness over time.
-
Sign Up: Click "Create New Account" on the login page and create an account with your organization details
-
Activate Account: Check your email for the activation link and set your password
-
Connect GitHub:
- Go to your Profile page
- Click "Connect GitHub Account" in the GitHub Integration section
- Authorize the Ortelius GitHub App
- Select which repositories to grant access to
-
Configure Repository Access:
- Visit GitHub Settings > Applications > Installed GitHub Apps
- Click "Configure" next to the Ortelius/PDVD app
- Under "Repository access", select the repositories you want to track
- Click "Save"
-
View Your Data: Your GitHub releases and their security posture will now appear in the Organizations and Dashboard views
Once connected, the system automatically:
- Monitors your GitHub releases and container deployments
- Scans for vulnerabilities using SBOM (Software Bill of Materials) data
- Tracks OpenSSF Scorecard metrics for repository security health
- Provides post-deployment vulnerability detection and remediation tracking
- Generates compliance-ready reports aligned with NIST frameworks
- Severity: Critical, High, Medium, Low, Clean
- OpenSSF Score: High (8.0+), Medium (6.0-7.9), Low (<6.0)
- Name/Package: Text-based search
- CVE ID: Direct CVE lookup
- Status: Active, Inactive, Error
- Environment: Production, Staging, Development, Test
- Endpoint Type: Kubernetes, Docker, VM, Serverless
- Organization-level isolation and access control
- Role-based permissions (admin, viewer)
- Public and private repository tracking
- Executive-level security metrics
- MTTR (Mean Time To Remediate) tracking
- SLA compliance monitoring (Critical: 15d, High: 30d)
- Vulnerability trend analysis (180-day rolling window)
- NIST framework alignment (SP 800-53, 800-137, 800-190, 800-218)
- Organizations: Portfolio-level security overview
- Dashboard: Detailed posture analysis with compliance metrics
- Synced Endpoints: Where software is running (K8s, Docker, VMs)
- Project Releases: Vulnerability tracking by release version
- Vulnerabilities: CVE database with CVSS scoring
- OpenSSF Scorecard integration
- SBOM-based dependency analysis
- Severity-based prioritization (Critical, High, Medium, Low)
- Post-deployment detection tracking
- Remediation workflow support
- SVG export for any dashboard component
- Compliance-ready documentation
- Detailed vulnerability breakdowns
- Historical trend visualization
- Dark/Light theme support
- Responsive design (mobile, tablet, desktop)
- Real-time filtering and search
- Breadcrumb navigation
- Collapsible sidebar with filter persistence
Average time from vulnerability detection to remediation, tracked separately for:
- All endpoint CVEs
- Post-deployment CVEs (detected after deployment)
Percentage of vulnerabilities remediated within severity-based timeframes:
- Critical: 15 days
- High: 30 days
- Medium: 90 days
- Low: 180 days
Vulnerabilities where the CVE disclosure date occurred after the release was deployed to production endpoints.
Net change in open vulnerabilities (New CVEs - Fixed CVEs) over the rolling 180-day window.
This dashboard is designed to support compliance with:
- NIST SP 800-53 Rev. 5 - SI-2 (Flaw Remediation)
- NIST SP 800-137 - Information Security Continuous Monitoring
- NIST SP 800-190 - Application Container Security Guide
- NIST SP 800-218 - Secure Software Development Framework (SSDF)
- RV.1: Identify and Confirm Vulnerabilities
- RV.2: Assess, Prioritize, and Remediate Vulnerabilities
- Executive Order 14028 - Improving the Nation's Cybersecurity
- DoD Continuous ATO - DevSecOps Requirements
- Admin: Full system access, user management, organization creation
- Viewer: Read-only access to assigned organizations
- User registration with email verification
- Admin approval and organization assignment
- Password-based login with session management
- Optional GitHub OAuth integration for repository access
Organization
βββ Releases (from GitHub or manual upload)
βββ Endpoints (deployment targets)
βββ Vulnerabilities (CVEs affecting the release)
βββ SBOM (Software Bill of Materials)
βββ OpenSSF Scorecard
The frontend communicates with the backend via GraphQL queries for:
- Dashboard metrics and trends
- Release and endpoint inventories
- Vulnerability details and relationships
- User authentication and profile data
We welcome contributions! Please see:
-
GitHub Issues: https://github.com/ortelius/pdvd-frontend/issues
-
Contributing Guide:
CONTRIBUTING.md -
Code of Conduct:
CODE_OF_CONDUCT.md -
Website: https://ortelius.io
-
GitHub: https://github.com/ortelius
-
Discord: https://discord.gg/ortelius
- Backend API: https://github.com/ortelius/pdvd-backend
- Ortelius Platform: https://github.com/ortelius/ortelius
- Clone the repository:
git clone https://github.com/ortelius/pdvd-frontend
cd pdvd-frontend- Install dependencies:
npm install- Configure environment:
cp .env.example .env.local
# Edit .env.local with your backend endpoints- Run development server:
npm run dev- Open browser:
http://localhost:4000
# Backend API Configuration
RUNTIME_GRAPHQL_ENDPOINT=http://localhost:3000/api/v1/graphql
RUNTIME_REST_ENDPOINT=http://localhost:3000/api/v1
# GitHub OAuth (for repository integration)
GITHUB_CLIENT_ID=your_github_client_id
GITHUB_CLIENT_SECRET=your_github_client_secretApache License 2.0 - See LICENSE file for details.
Maintained by the Ortelius open-source community with support from:
- Cloud Native Computing Foundation (CNCF)
- Continuous Delivery Foundation (CDF)
- OpenSSF (Open Source Security Foundation)
For security disclosures, please email: security@ortelius.io
