Reviewing and triaging new vulnerabilities is necessary to ensure successful
remediation. Transform vulnerability imports into remediation tasks with automated vulnerable
item (VI) assignment, risk calculation, remediation targets, and VI grouping.
Starting with imported vulnerabilities, reconcile the assets not found in the CMDB, prioritize
the results, translate that to remediation activities that are automatically assigned,
orchestrate the remediation process, and confirm completion with a validation scan.
New vulnerable items are usually sorted into vulnerability groups upon import, based on
vulnerability group rules. Sometimes, vulnerable items cannot be grouped or do not contain a
recognized configuration item.
An overview of the vulnerability triage process: