Skip to content

Asset focus

This area lists all zones, products, and assets from the inventory for which at least one vulnerability is known. Assets that are free of vulnerabilities are not displayed.

You can display all vulnerabilities of the selected asset and define appropriate tasks.

Zone overview

This area lists the zones affected by vulnerabilities ② and shows how they are affected ⑤. Clicking on a zone opens the 'Assets list'.

You can filter zones ① or adjust the sorting of zones ③.

Additional information is provided for each zone (④-⑦).

none

Number Description
Input field for filtering the zones
List of zones
Sort button

none

Number Description
Zone name
Distribution of the individual risk levels over all of the affected assets; see color bar for risk level.
Number of assets in this zone affected by at least one vulnerability.
Ratio between a) the total number of assets in this zone and b) the number of affected assets in this zone; at '100%', every asset contained in the zone is affected by at least one vulnerability.

Asset list for zones

This area shows information about the selected zone as well as all products and assets in the inventory that are part of the zone and affected by at least one vulnerability.

Clicking the button ① takes you back to the 'Zone overview'.

The zone details ② show important information about the zone.

The list of products ③ shows products that contain at least one asset that is in the zone and is affected by a vulnerability. Clicking on it displays all affected assets ④. Details can be displayed for a selected asset ⑥.

After you select an asset and then navigate to the 'Threats and tasks' area ⑥, all vulnerabilities of the selected asset can be viewed and appropriate tasks can be defined. For each affected asset, the greatest risk level due to the currently pending vulnerabilities ⑦ is shown. It also shows how many of these pending vulnerabilities are still in the 'Open' status, and what the highest risk level of the open vulnerabilities is ⑩.

none

Number Description
Name of the selected zone and navigation back to the 'Zone overview'
Zone details display important information about the zone
List of products affected by vulnerabilities
Highest risk level of the assets of the respective product
Button to switch to 'Threats and tasks'
Display of asset details

none

Number Description
Highest risk level due to an unfixed vulnerability on this asset
Asset name
IP address of the asset
Number and highest risk level of 'Open Threats'

Asset overview

Assets-tab ② in Asset focus shows all the vulnerable assets regardless of zone assignment. This view allows quick search for the specific asset.

none

Number Description
Zones-tab displays asset risk information grouped by zone
Assets-tab displays all the assets affected by vulnerabilities in the system

Threats and tasks

This section allows you to create tasks for a device based on the vulnerabilities it is exposed to. It is divided into four sections:

To efficiently address the vulnerabilities of a device, the following steps are recommended:

  1. Review the device information ① to ensure the correct device is being processed.
  2. Examine the information in the 'Active' status group in the "Vulnerabilities and Possible Countermeasures" section ②: a. Firmware should always be up to date – many vulnerabilities can already be resolved by installing the latest firmware version. If the installed firmware is outdated, a corresponding task should be added to the Task list ③; all vulnerabilities that would be resolved by the firmware update will automatically be marked as 'Planned'. b. All untreated vulnerabilities should be reviewed one by one, and corresponding tasks to address the vulnerabilities should be added to the Task list ③. c. Once the status of a vulnerability changes from 'Open' to 'Planned', this will be reflected in all SSG statistics – such as in the progress ④ or on Home.
  3. Review all tasks in the Task list ③: a. Avoid conflicting tasks; if necessary, remove tasks and/or add a well-formulated custom task. b. Remove duplicate tasks. c. Edit tasks (e.g., adjust priority) until the entirety of the tasks in the Task list is meaningful. d. Link all tasks to all vulnerabilities they are needed to address, and adjust priority if necessary.
  4. Publish the Task list ④. This transfers all tasks in the list to the Task management – changing these tasks in the 'Vulnerabilities and Tasks' section is no longer possible.
  5. If necessary, navigate back to the device list in the device information ① to address the vulnerabilities of another device.
  6. Once all tasks are defined and published as desired, they can be further processed in the Task Management.

The overview illustrates a rough process:

  1. A device has untreated vulnerabilities for which no tasks have been defined yet; the progress is 0%.
  2. Tasks have been planned for some vulnerabilities, some of which have already been published; the progress is greater than 0% but not yet 100%.
  3. Tasks have been planned for as many vulnerabilities as possible, and all tasks are published; ideally, the progress is 100%, but sometimes it may be less.
  4. The Task management shows the published tasks. Here, they can be marked as 'Implemented' after completion. This marks the vulnerability as resolved.

none

Number Description
Device information
Vulnerabilities related to the device
Tasks planned for the device
Information on progress and additional functions

none

Number Description
Example state of a device in 'Vulnerabilities and Tasks' before processing
Example state after partial processing
Example state after complete processing
Example state of tasks for a device in 'Task Management'

Asset information

This area provides information about the affected device and displays its name ②, the zone ④, the IP address ⑤, and the currently installed firmware version ⑥; if the firmware version of the device has been manually edited, this is indicated accordingly ⑦. Additional information is displayed with the 'Device details' button ③.
Clicking the back button ① navigates back to the device list.

none

Number Description
Button 'Back to device list'
Device name
Button 'Device details'
Name of the device's zone
IP address
Version of the currently installed firmware
Optional note if the firmware version has been manually changed

Vulnerabilities and possible countermeasures

This area provides information about vulnerabilities that compromise the security of the device and offers possible countermeasures to address them.

Status groups

The managing status of a vulnerability is defined by the evaluation of the vulnerability and the planning and execution of countermeasures. Status groups help to keep track of vulnerabilities: Each status group gathers vulnerabilities according to their respective managing status, allowing users to specifically display, for example, all vulnerabilities that still pose an acute threat.

Only those status groups additionally show the number of vulnerabilities they contain where the goal is an empty list.

Status group Managing status Applied status
Active Displays all vulnerabilities that have not yet been fully processed 'Open', 'Planned'
Treated Displays all vulnerabilities for which the user has decided to take no action 'Obsolete by Implementation', 'Not Relevant', 'Resolved'
Fixed Displays all vulnerabilities whose tasks have already been completed 'Fixed'

none

Number Description
Status group 'Active' with the number of vulnerabilities it contains
Status group 'Treated'
Status group 'Fixed'
Status group 'Active'

This status group displays vulnerabilities that are currently active. Tasks can be planned to address these vulnerabilities.
Planning tasks is only possible for vulnerabilities in the 'Active' status group.

Firmware update

The 'Firmware Update' object displays information about the current firmware status of the device:

If a newer firmware version is available to address vulnerabilities than the currently installed one, the 'Firmware Update' object is displayed with the following information:

  • Version of the latest firmware to address vulnerabilities ① with an optional download link ②
  • Number of vulnerabilities resolved by this firmware ⑤
  • The planning status of a corresponding firmware update task can be:
    • Not yet planned ③; clicking the link adds the firmware update task to the Task list
    • Planned ④; the corresponding task is listed at the top of the Task list

If no update recommendation is available ⑥, a firmware update task can still be created – for example, for a new firmware version that does not address vulnerabilities.

none

Number Description
Version of the latest firmware
Firmware update task is not yet planned
Optional: Link to the firmware download page
Firmware update task is planned
Number of vulnerabilities that can be resolved with this version
Representation in case no update recommendation is available
Vulnerability list

A vulnerability can have one of the following statuses:

Vulnerability Status Description Linked to Tasks Automatic Resubmission Status Group
Open No decision has been made regarding this vulnerability yet No No Active
Planned At least one task is linked to this vulnerability Yes No Active
Risk accepted till The impact of this vulnerability is known and accepted No Yes On hold
Remediation blocked The vulnerability cannot be resolved due to current circumstances No Yes On hold
Asset removal planned The device is planned to be removed from the facility No No On hold
Not relevant This vulnerability cannot affect operations No Yes Treated
Obsolete by implementation This vulnerability is resolved through other planned tasks No No Treated
Mitigated This vulnerability has been mitigated through countermeasures Yes No Treated
Fixed This vulnerability has been resolved according to the manufacturer's recommendation Yes No Fixed

Each vulnerability can be expanded or collapsed.
When collapsed, it displays the following information:

  • Button to expand ①
  • Risk level of the vulnerability ② for the selected device – see Risk Level
  • If the vulnerability is newly added since the last task publication ('New' ③) or if the publisher has updated the vulnerability description ('Updated' – e.g., from CVE version 1.2 to 1.3), this is indicated.
  • Title of the vulnerability ④
  • Current processing status of the vulnerability ⑤

When expanded, it displays the following information:

  • All information from the collapsed view (the previous expand button is replaced by the collapse button ⑨)
  • Publisher of the security advisory ⑥, vulnerability identifier ⑦ (clicking opens the vulnerability description in a sidebar), and the identifier of the security advisory ⑧ (clicking opens the advisory in a separate browser window).
  • Description of the vulnerability ⑩
  • Detection date on the device ⑬ and last update of the vulnerability ⑭
  • Recommendations according to the vulnerability description, which may include 'Manufacturer's update recommendation' ⑪ (optionally with a link to the resource) and 'Workarounds and countermeasures' ⑫. Using button ⑯, a specific task can be created from a recommendation in the Task List section and linked to this vulnerability; in this case, the button is replaced by a link symbol ⑮. If identical recommendations appear in other vulnerabilities of this device, they are automatically linked to the task as well, and the vulnerability status is set to "Planned." For recently published vulnerabilities, it may happen that no recommendations are available – this is indicated accordingly ⑰ ⑱. Manufacturers often provide these later. For very outdated devices, it must be expected that they are no longer supported by the manufacturer.

none

Number Description
Button to expand the vulnerability information
Risk level of the vulnerability for this device
Optional: Indication of changes since the last task publication
Title of the vulnerability
Processing status of the vulnerability
Publisher of the security advisory
Description of the vulnerability
Manufacturer's update recommendation
Button to collapse the vulnerability information
Description of the vulnerability
Manufacturer's update recommendation
Workarounds and countermeasures
Detection date on the device
Last update of the vulnerability
Indication that a corresponding task for this measure has already been created in the task area
Button to create a corresponding task in the task area
Representation in case no manufacturer's update recommendation is available
Representation in case no workarounds or countermeasures are available
Status group 'Treated'

This status group displays vulnerabilities for which all associated 'Workarounds and Countermeasures' tasks have been implemented.

The functionality and operation largely follow the description of the 'Active' status group, with the following differences:

  • The 'Firmware Update' object is not displayed.
  • Tasks cannot be created.
  • A vulnerability can be reactivated.
Status group 'Fixed'

This status group displays vulnerabilities for which the manufacturer's update recommendation has been implemented.

The functionality and operation largely follow the description of the 'Active' status group, with the following differences:

  • The 'Firmware Update' object is not displayed.
  • Tasks cannot be created.
  • A vulnerability can no longer be reactivated.

Task list

This section displays all tasks defined for the affected device (see Asset information). For each task, the vulnerabilities it is linked to are shown. Additionally, custom tasks ④ can be created here.

Four different types of tasks are possible:

Number Task Type Content Options
1 Firmware Update ① Version of the firmware to be installed; the latest security-relevant version is preselected Selection of the firmware version to be installed
2 Manufacturer's Update Recommendation ② Corresponding text according to the vulnerability description -
3 Workarounds and Countermeasures ③ Corresponding text according to the vulnerability description -
4 Custom Task ④ Description of the custom task Text input; the task cannot be added without text

none

Number Description
Firmware update
Manufacturer's update recommendation
Workarounds and countermeasures
Custom task
Task's linkage status with the selected vulnerability
Target firmware version for the update task
Version of the currently installed firmware
Total number of resolved vulnerabilities
Task's publication status
Task description
Button to edit the task
Selected planning priority
Optional: Indication that the task is not linked to any vulnerability

Editing tasks

A newly created task is in edit mode. Here, the priority ③ ⑧ can be set, or the task can be removed ④. Depending on the task type, data from a predefined list can be selected ① ⑥, or free text can be entered or modified ⑦.

Once the task's contents are set as desired, clicking outside the task exits the edit mode and saves the changes.
As long as a task has not yet been published, the edit mode can be reopened using a button ②.

none

Number Description
Selection field for firmware version (only for firmware update tasks)
Link to the download page of the firmware version (only for firmware update tasks)
Selection field for the task's priority
Button to delete the task
Dropdown list of available security-relevant firmware versions
Selection field for a manually entered firmware version
Input field for free text (only for custom tasks)
Dropdown list for the task's priority
Selecting priority

The priority of a task is important for further processing and planning in Task management. Every newly created task is automatically assigned a medium priority, which can then be adjusted as needed. To select the priority of a task, switch to the task's edit mode, open the priority menu, and choose the desired priority.

Removing a task

A task that is no longer needed can be removed from the Task list. It will no longer contribute to the processing of vulnerabilities, which may affect the status of vulnerabilities and the Managing status. To remove a task, switch to the task's edit mode and select the button to delete it.

Linking vulnerabilities and tasks

Linking vulnerabilities and tasks ensures that the implementation of a task can be checked to determine whether the vulnerability has been resolved. A vulnerability is considered:

  • Treated when all 'Workarounds and Countermeasures' tasks linked to the vulnerability have been implemented.
  • Resolved when the manufacturer's update recommendation has been implemented.

Linking is managed as follows:

  • A vulnerability must always be selected to create a task.
  • When adding a 'Manufacturer's Update Recommendation' or a 'Workaround and Countermeasure' from a vulnerability description (see Vulnerability List), the link between the vulnerability and the task is automatically established.
  • Manually creating a task is only possible if a vulnerability is selected; the manually created task is then automatically linked to this vulnerability.
  • Clicking the linkage indicator ① ② toggles between the linkage states 'linked' ① and 'not linked' ②; any links to other vulnerabilities remain unaffected.

Note
The linkage status can be changed without entering edit mode.

none

Number Linkage Status Description
Linked Task is linked to the currently selected vulnerability
Not linked Task is not linked to the currently selected vulnerability

Task publication status and overview

Tasks can have one of these statuses:

Task Publication Status Representation Meaning Task Editable Task Visible in Task Management
New Task has been defined but not yet published Yes No
Published Task has been published and is now visible in Task management Yes Yes
Updated Already published task has been modified; the change must be published to be visible in Task management Yes No
Implemented Already published task has been executed No No
Not connected Task is not connected to a vulnerability Yes No

In the 'Active' status group, a summary aggregates tasks by status: the number of new or updated tasks ③, which only take effect after publication, and the number of already published tasks ④.

none

Number Description
Date of the most recent publication of tasks in this Task list
Button to switch to Task management
Number of tasks not yet published
Number of published tasks
Publication status of the task

Managing progress and additional functions

The Managing progress ① shows the ratio between vulnerabilities in the 'Planned' state and those in the 'Open' state. All other vulnerabilities are no longer considered here, as they have already been resolved or addressed by other solutions.

The button ② is used to publish all tasks and, if applicable, creation, update, and deletion requests for tasks in Task management. At this point, all necessary tasks for this device are considered defined and can no longer be changed. The further procedure with these tasks is described in the chapter Task Management. Unpublished tasks are not found in Task management and therefore cannot be completed.

none

Number Description
Managing progress of all vulnerabilities for this device
Button to publish all tasks in the Task list