Risk Overview
Overview
The Risk Overview dashboard provides a consolidated summary of security findings across your entire environment. By aggregating data from cloud workloads, network perimeters, code vulnerabilities, web applications, and cloud security modules, this dashboard helps teams visualize risk metrics and prioritize remediation efforts based on real risk exposure.
Supported Security Modules
The dashboard aggregates and displays vulnerability data from the following active DeepTraQ scanners:
- Cloud Security (CSPM)
- Source Code / Code Vulnerabilities
- Web Applications
- Network Perimeter
- Cloud Workload Risks
Prerequisites
- At least one successful scan completed across any supported security module.
Dashboard Components
Risk Metrics Summary
View a consolidated summary of risk metrics derived from the latest scans across all security modules. This high-level view helps you instantly gauge the overall health of your environment.
Vulnerability Impact Chart
This chart visualizes vulnerability impact across all modules. You can hover over the stacked bars to view detailed findings broken down by severity and specific category.
Vulnerabilities by Source
This panel sums up the detected vulnerabilities based on their origin source, clearly delineating between risks found in cloud environments, source code, and web applications.
Unique Vulnerabilities List
Scroll down to view a comprehensive list of unique vulnerabilities detected across your environment.
- Search and Filter: Use the search bar to find vulnerabilities by name (e.g., searching for "Oracle"). You can add multiple keywords and use AND/OR conditions to refine your results.
- Sort: Click on the Severity column header to sort vulnerabilities by their assigned risk level.
CVE Frequency
This section lists all identified Common Vulnerabilities and Exposures (CVEs) and displays how frequently each specific CVE appears across your scanned assets.
Top Risky Resources
Located at the bottom of the dashboard, this view ranks hosts and cloud resources based on vulnerability volume and severity.
- Sorting: Click on any column header to sort the findings based on your preferred criteria.
- Filtering: Use the dedicated search field within this section to filter for specific risky resources.
Field Reference
| Field | Description | Example |
|---|---|---|
| Vulnerability Search Bar | Supports multiple keywords and AND/OR conditions to filter the unique vulnerabilities list. | Oracle AND SQL |
| Severity Column | Sorts the list of vulnerabilities from highest to lowest risk (or vice versa). | Critical, High, Medium, Low |
| Top Risky Resources | A ranked list of hosts and cloud assets based on the volume and severity of vulnerabilities present. | aws-prod-db-01 |
| Top 100 Resources | A view displaying the impact of vulnerabilities on the 100 most critical or vulnerable resources. | N/A |