Skip to content

Library ListΒΆ

Category Metric Type
Asset Management Assets known to Asset Management control
Data Protection Systems with their volumes encrypted risk
Disaster Recovery Systems with backups configured per their SLO control
Systems that has had a successful backup per their SLO performance
Identity Management Identities with MFA risk
Identity - Credentials - Regular Password Rotation control
Identity - Inactive Identities control
Accounts without Admin privileges risk
Malware Protection Systems with an up-to-date agent deployed control
Network Security Network Security - DNS Domains Expiring Within the Next Month risk
Network Security - DNS Domains with SPF configured risk
Network Security - DNS Domains with DMARC Configured risk
Network Security - External endpoints with insecure ports exposed risk
Network Security - External endpoints protected by a WAF control
Software Development SDLC - Repositories with SAST / DAST scanning enabled control
SDLC - Repositories without exploitable vulnerabilities risk
SDLC - Repositories without exploitable vulnerabilities remediated within SLO performance
User Security Users completed awareness training in the last 12 months control
Vulnerability Management Systems with an up-to-date agent deployed control
Systems with an up-to-date vulnerability database deployed control
End-of-life - Systems running vendor-supported software risk
Vulnerabilities not remediated within SLO - critical and high performance
Vulnerabilities not remediated within SLO - exploitable performance
Vulnerabilities not remediated within SLO - exploitable patchable performance
Vulnerabilities not remediated within SLO - exploitable patchable critical and high performance
Vulnerabilities not remediated within SLO - patchable performance
Systems without vulnerabilities - exploitable and patchable critical and high risk
Systems without vulnerabilities - exploitable and patchable critical and high risk
Systems without vulnerabilities in 48 hours - exploitable or critical and high risk
Systems without vulnerabilities - exploitable and patchable critical and high risk
Systems without vulnerabilities - exploitable and patchable critical and high risk
Systems without vulnerabilities - non critical patched in 2 weeks risk
Systems without vulnerabilities - non critical patched in a month risk
Systems without vulnerabilities - exploitable and patchable critical and high risk