Skip to main content

CyTech AQUILA - Vulnerability Assessment and Management (Module)

Overview:

In AQUILA, the Vulnerability Assessment and Management (VAM) module is designed to help organizations identify, analyze, prioritize, and remediate security weaknesses across their IT infrastructure.

Key Features:
  • Dashboard - Provides an overview of the organization’s risk posture, showing vulnerability scores, scan status, severity levels, affected asset types, top CVEs, and most vulnerable assets.
  • Scan - It shows you all currently running scans with percentage to completion and number of severities.

Let’s proceed to navigate the Vulnerability Assessment and Management Module kindly follow the instructions below:

Step 1: Log in to CyTech – AQUILA. https://usdc.cytechint.io/

Step 2: In the left side panel, you can see the list of six (6) domains, kindly choose and click the Risk Management (Domain) -> Vulnerability Assessment and Management (Module) -> Detection (Sub Module)

image.png

 "Dashboard (Sub-module)" - Vulnerability Assessment and Management (Module)

The Vulnerability Assessment & Management Dashboard in AQUILA provides a centralized view of all detected vulnerabilities. It shows the overall risk scoretrendsseverity distribution, and affected assets. Users can monitor scans, identify top vulnerabilities (CVEs), and track the most at-risk assets, enabling quicker prioritization and remediation.

image.png

Uses of Dashboard Sections

  1. Total Vulnerabilities - Displays the total number of detected vulnerabilities across all endpoints and their current mitigation status.
  2. Severity Breakdown - Shows the distribution of vulnerabilities based on their severity levels, helping prioritize remediation efforts.
  3. Needs Attention Vulnerabilities - Lists critical or high-severity vulnerabilities that require immediate review or action.
  4. Mitigated in Progress - List of the Vulnerabilities and Endpoints that are currently on process of mitigation.
  5. Mitigated - List of the Vulnerabilities that are mitigated

 


Endpoints

The client can also access the list of their endpoints and how many vulnerabilities are affected; this section can be found below the Detection.

image.png

  1. Exposure Distribution -Shows the number of endpoints based on their current exposure level (Critical, High, Medium, Low).
  2. Top 3 Vulnerable Endpoints by Exposure - Displays the three endpoints with the highest number of detected critical and high vulnerabilities, broken down by severity level.
  3. Top 5 Vulnerabilities Needing Attention - Lists the vulnerabilities that impact the most endpoints and require immediate action. Prioritizes Critical and High severity.
  4. Endpoint list - List of the Endpoints and # of vulnerabilities.

    "Scan (Sub-module)" - Vulnerability Assessment and Management (Module)

    The Running Scans page in AQUILA shows all ongoing vulnerability scans with progress and severity details. From here, users can search scans, launch new ones, and toggle to view completed scans. The client can also view their scan result by pressing the view button.

    Test (8).png

    Test (9).png

    New Scan " - The New Scan lets users choose the type of scan (Quick, Website, Network, or Mobile) depending on the asset being tested, each tailored to identify vulnerabilities and provide security insights.

    Test (10).png


    Vulnerability Reports - Vulnerability Assessment and Management (Module)

    In this section, the client can view, manage and generate report by pressing "Generate Report" button

    HEHE (6).png

    After pressing "Generate Report" and filling up the required information it will generate a report summary on the endpoints that are affected by the vulnerability and their CVE's that are related to the vulnerabilities. The client can also press "Download Report" to generate a pdf form of the report.

    HEHE (7).png

    If you need further assistance, kindly contact support@cytechint.com for prompt assistance and guidance.