Skip to main content

Risk Overview

Overview

The Risk Overview dashboard provides a consolidated summary of security findings across your entire environment. By aggregating data from cloud workloads, network perimeters, code vulnerabilities, web applications, and cloud security modules, this dashboard helps teams visualize risk metrics and prioritize remediation efforts based on real risk exposure.


Supported Security Modules

The dashboard aggregates and displays vulnerability data from the following active DeepTraQ scanners:

  • Cloud Security (CSPM)
  • Source Code / Code Vulnerabilities
  • Web Applications
  • Network Perimeter
  • Cloud Workload Risks

Prerequisites

  • At least one successful scan completed across any supported security module.

Dashboard Components

Risk Metrics Summary

View a consolidated summary of risk metrics derived from the latest scans across all security modules. This high-level view helps you instantly gauge the overall health of your environment.

Vulnerability Impact Chart

This chart visualizes vulnerability impact across all modules. You can hover over the stacked bars to view detailed findings broken down by severity and specific category.

Vulnerabilities by Source

This panel sums up the detected vulnerabilities based on their origin source, clearly delineating between risks found in cloud environments, source code, and web applications.

Unique Vulnerabilities List

Scroll down to view a comprehensive list of unique vulnerabilities detected across your environment.

  • Search and Filter: Use the search bar to find vulnerabilities by name (e.g., searching for "Oracle"). You can add multiple keywords and use AND/OR conditions to refine your results.
  • Sort: Click on the Severity column header to sort vulnerabilities by their assigned risk level.

CVE Frequency

This section lists all identified Common Vulnerabilities and Exposures (CVEs) and displays how frequently each specific CVE appears across your scanned assets.

Top Risky Resources

Located at the bottom of the dashboard, this view ranks hosts and cloud resources based on vulnerability volume and severity.

  • Sorting: Click on any column header to sort the findings based on your preferred criteria.
  • Filtering: Use the dedicated search field within this section to filter for specific risky resources.

Field Reference

FieldDescriptionExample
Vulnerability Search BarSupports multiple keywords and AND/OR conditions to filter the unique vulnerabilities list.Oracle AND SQL
Severity ColumnSorts the list of vulnerabilities from highest to lowest risk (or vice versa).Critical, High, Medium, Low
Top Risky ResourcesA ranked list of hosts and cloud assets based on the volume and severity of vulnerabilities present.aws-prod-db-01
Top 100 ResourcesA view displaying the impact of vulnerabilities on the 100 most critical or vulnerable resources.N/A