Install the Vulnerability Response Integration with the NIST National Vulnerability Database
-
- UpdatedAug 3, 2023
- 4 minutes to read
- Vancouver
- Vulnerability Response
Install the Vulnerability Response Integration with the NIST National Vulnerability Database
Before you run the integration on your instance, the installation and configuration steps must be completed so the NIST National Vulnerability Database (NVD) product properly integrates with Vulnerability Response. This application is available as a separate subscription.
Before you begin
Setup tasks | Description |
---|---|
Verify that the Vulnerability Response application is installed and activated. | To verify that this application is activated, navigate to in your instance. The list displays the subscriptions that your organization has purchased.If the application isn’t installed and activated see, Install Vulnerability Response. |
Verify that you have the required ServiceNow roles for your instance. | The following roles are required for installation, configuration, and verification of expected results:
|
There’s a configured run-as user for each integration record. The default value for this user is VR.System. Don’t change this value.
Procedure
What to do next
After initial installation, for modifications refer to Optional NVD integration modification and activities.
Activate the NIST National Vulnerability Database–API (Unmapped CPE)
To ingest Common Platform Enumeration (CPE) data for fetched Common Vulnerabilities and Exposures (CVE) data, you can perform a full data import with an on-demand scheduled job.
Before you begin
The National Institute of Standards and Technology (NIST) National Vulnerability Database Integration (NVD)–API (Unmapped CPE) integration captures (CPE) data that includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name. This information is stored in an NVD vulnerability entry record related list.
Role required: sn_vul.vulnerability_admin or App-Sec ManagerProcedure
Activate the NIST National Vulnerability Database–API (CPE only)
To ingest Common Platform Enumeration (CPE) data, you can perform a full data import with a daily scheduled job.
Before you begin
The National Institute of Standards and Technology (NIST) National Vulnerability Database Integration (NVD)–API (CPE only) integration captures (CPE) data that includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name. This information is stored in a vulnerable software table.
Role required: sn_vul.vulnerability_admin or App-Sec ManagerProcedure