Using mitigation controls monitoring with Security Posture Control
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Security Operations
Using mitigation controls monitoring with Security Posture Control
From within in the Security Posture Control (SPC) Workspace, gain insight into which threats to your assets are mitigated by available mitigation controls based on how various security tools are configured.
Mitigation controls monitoring
For supported applications for Security Posture Control and Mitigation Controls Monitoring, see Exploring Security Posture Control.
- Asset inventory - Identifying all your enterprise assets that include unmanaged or unknown assets.
- Security controls coverage and health - Identifying any coverage gaps with your security controls
- Threat mitigation visibility - Identifying which threats to your assets are mitigated by applicable mitigation controls.
- Web application firewall as a mitigation for the technique Initial .
- Exploit protection as a mitigation for techniques such as .
- Multi-factor authentication as a mitigation for the technique .
- admin - Installs applications from the ServiceNow® Store and activates plugins (ITOM Discovery).
- SPC Admin Group and SPC Analyst Group - Users in this group have full read and write access to all the records for the product and the workspace.
- SPC Analyst Read Only Group - Users in this group have full read access to all the records for the product.
Mitigation controls monitoring users and benefits
User | Description |
---|---|
Cybersecurity teams, Security analysts and managers |
|
Security Posture Control and the mitigation controls monitoring workflow
Security Posture Control uses API integrations with security tools such as web-application-firewalls and endpoint protection tools to import additional configuration data about your assets and analyze it to identify the applicable mitigation controls for a given asset. These API integrations are separate from the service graph connector integrations that are supported by SPC and import different data. You configure these API integrations from within the SPC Workspace.
Service graph connector integrations or ITOM Discovery are still required for mitigation controls monitoring. For example, both the CrowdStrike Service Graph Connector and the CrowdStrike API integration supported by SPC must be activated to import additional insights about which mitigation controls are enabled by the CrowdStrike endpoint protection configuration.