The Assets list is where all your assets are displayed, after they are ingested from the various sources, de-duplicated and enriched. There are 4 types of assets in Vulcan, displayed in 4 different tab:
- Hosts – Infrastructure, physical or virtual machines
- Code projects – SCA and SAST codebases
- Websites – DAST scans
- Images – Image and container scans
Hosts
KPIs
At the top of the Hosts page 4 summarizing KPIs are shown:
- Sources breakdown
- Scan coverage
- Vulnerability breakdown by criticality
- Hosts per OS
Table
The hosts are displayed in a table with the following fields:
- Name – The host’s name as ingested from the source scanner
- OS
- IP
- Sources – The host’s source platform or scanner
- Last seen – Last time one of the host’s sources reported on it
- Vulnerabilities – Total number of vulnerabilities affecting the host
- Top risk – Criticality of the top riskiest vulnerability affecting the host
- Tags
Magic search
In addition to free text search, the following parameters are filterable in the Vulnerability list:
- OS and version
- IP
- Sources
- Tags
Code Projects
Table
The Code Projects are displayed in a table with the following fields:
- Project – The Code Projects’s name as ingested from the source scanner
- Languages – The coding languages present in the Code Project
- Sources – The Code Project’s source platform or scanner
- Last seen – Last time one of the Code Project’s sources reported on it
- Vulnerabilities – Total number of vulnerabilities affecting the Code Project
- Top risk – Criticality of the top riskiest vulnerability affecting the Code Project
- Tags
Magic search
In addition to the free text search, the following parameters are filterable in the Vulnerability list:
- Sources
- Tags
Websites
Table
The Websites displayed in a table with the following fields:
- Site name – The Website’s name as ingested from the source scanner
- Address – The Website’s address
- Sources – The Website’s source platform or scanner
- Last seen – Last time one of the Website’s sources reported on it
- Vulnerabilities – Total number of vulnerabilities affecting the Website
- Top risk – Criticality of the top riskiest vulnerability affecting the Website
- Tags
Magic search
In addition to free text search, the following parameters are filterable in the Vulnerability list:
- Sources
- Tags
Images
Table
The Images are displayed in a table with the following fields:
- Images – The Image's name as ingested from the source scanner
- Type – The Image type
- Path – The Image's path
- Sources – The Image's source platform or scanner
- Last seen – Last time one of the Imagae's sources reported on it
- Vulnerabilities – Total number of vulnerabilities affecting the Image
- Top risk – Criticality of the top riskiest vulnerability affecting the Image
- Tags
Magic search
In addition to the free text search, the following parameters are filterable in the Vulnerability list:
- Sources
- Tags