Skip to main content

CyTech AQUILA - Vulnerability Assessment and Management (Module)

Overview:

In AQUILA, the Vulnerability Assessment and Management (VAM) module is designed to help organizations identify, analyze, prioritize, and remediate security weaknesses across their IT infrastructure.

Key Features:
  • Dashboard - Provides an overview of the organization’s risk posture, showing vulnerability scores, scan status, severity levels, affected asset types, top CVEs, and most vulnerable assets.
  • Scan - It shows you all currently running scans with percentage to completion and number of severities.

Let’s proceed to navigate the Vulnerability Assessment and Management Module kindly follow the instructions below:

Step 1: Log in to CyTech – AQUILA. https://usdc.cytechint.io/

Step 2: In the left side panel, you can see the list of six (6) domains, kindly choose and click the Risk Management (Domain) -> Vulnerability Assessment and Management (Module) -> DashboardDetection (Sub Module)

Test (3).pngimage.png

 "Dashboard (Sub-module)" - Vulnerability Assessment and Management (Module)

The Vulnerability Assessment & Management Dashboard in AQUILA provides a centralized view of all detected vulnerabilities. It shows the overall risk scoretrendsseverity distribution, and affected assets. Users can monitor scans, identify top vulnerabilities (CVEs), and track the most at-risk assets, enabling quicker prioritization and remediation.

Test (7).pngimage.png

Uses of Dashboard Sections (1–7)

  1. Total

    OverallVulnerabilities Vulnerability- Score

    • Displays the organization’s current security posture on a gauge meter.

    • Helps quickly see if the environment is at minimal, moderate, or high risk.

  2. Overall Vulnerability Score – Trend

    • Shows how the vulnerability score changes over time.

    • Useful for monitoring whether risks are being reduced after remediation.

  3. Scan Summary (Running, Completed, Assets Scanned)

    • Provides the status of vulnerability scans:

      • Running scans in progress

      • Completed scans finished

      • Totaltotal number of assetsdetected scanned

        vulnerabilities
      • across
      all endpoints and their current mitigation status.
    • Severity

      Let'sBreakdown users- trackShows scanningthe activitydistribution atof avulnerabilities glance.

      based
    • on
    their severity levels, helping prioritize remediation efforts.
  4. Needs

    Attention Vulnerabilities by- Severity

    Lists
      critical
    • or

      Breaks downhigh-severity vulnerabilities intothat categories:require immediate review or action.

    • Mitigated in Progress - List of the Vulnerabilities and Endpoints that are currently on process of mitigation.
    • Mitigated - List of the Vulnerabilities that are mitigated

 


Endpoints

The client can also access the list of their endpoints and how many vulnerabilities are affected; this section can be found below the Detection.

image.png

  1. Exposure Distribution -Shows the number of endpoints based on their current exposure level (Critical, High, Medium, Low, InformationalLow).

  2. Top

    Helps3 prioritizeVulnerable remediation based on severity levels.

  3. VulnerabilitiesEndpoints by AssetExposure Type

    -
    • Organizes vulnerabilities according toDisplays the assetthree scanned:

      • Web Assets

      • Network Assets (coming soon)

      • Mobile Assets (coming soon)

    • Useful for identifying which type of asset is most at risk.

  4. Top CVEs Detected

    • Lists the most critical Common Vulnerabilities and Exposures (CVEs) identified.

    • Includes CVE ID, severity, CVSS score, reference, and number of affected assets.

    • Helps focus attention on widely known and exploitable vulnerabilities.

  5. Top Vulnerable Assets

    • Highlights assetsendpoints with the highest number of vulnerabilities.

      detected critical and high vulnerabilities, broken down by severity level.
    • Top

      Shows5 assetVulnerabilities name,Needing averageAttention severity,- averageLists CVSSthe rating,vulnerabilities that impact the most endpoints and totalrequire vulnerabilities.

      immediate action. Prioritizes Critical and High severity.
    • Endpoint

      Helpslist security- teamsList prioritizeof whichthe systemsEndpoints needand urgent# attention.

      of vulnerabilities.

    "Scan (Sub-module)" - Vulnerability Assessment and Management (Module)

    The Running Scans page in AQUILA shows all ongoing vulnerability scans with progress and severity details. From here, users can search scans, launch new ones, and toggle to view completed scans. The client can also view their scan result by pressing the view button.

    Test (8).png

    Test (9).png

    New Scan " - The New Scan lets users choose the type of scan (Quick, Website, Network, or Mobile) depending on the asset being tested, each tailored to identify vulnerabilities and provide security insights.

    Test (10).png


    Vulnerability Reports - Vulnerability Assessment and Management (Module)

    In this section, the client can view, manage and generate report by pressing "Generate Report" button

    HEHE (6).png

    After pressing "Generate Report" and filling up the required information it will generate a report summary on the endpoints that are affected by the vulnerability and their CVE's that are related to the vulnerabilities. The client can also press "Download Report" to generate a pdf form of the report.

    HEHE (7).png

    If you need further assistance, kindly contact support@cytechint.com for prompt assistance and guidance.