Risk Flashcards
What is the primary use of risk section?
help understand how deployment configuration and runtime activity impact the likelihood of an exploit occurring and how successful those exploits will be
What are the tabs of a risk item?
Risk indicators
Deployment details
Process discovery
What are the section for a risk indicator?
RBAC Configuration
Violations
Image freshness
Service configuration
Service reachability
Number of components in image
Components Useful for Attackers
How does ACS RHACS monitors runtime activity
build a baseline of observed behavior, and tracking deviations from that baseline.
What are elements of the Event Timeline in process discovery?
1) policy violations
2) process restart and terminations
3) process activities