Exploring and Managing Risks Exploring and Managing Risks

Exploring and Managing Risks

What are Risks?

Risks represent exploitable weaknesses in your environment. Examples of Risks include software vulnerabilities, exposed sensitive services, misconfigurations, hard-coded secrets, and more. Chariot uses numerous open-source and propriety tools to detect risks in your organization. All discovered risks can be viewed and managed in the Risks tab.

Viewing and managing Risks

After discovering Assets, Chariot scans each Asset for Risks every 24 hours. All detected Risks can be viewed from the Risks page:

You can filter this view by Severity, Status, Threat Intel, or Origin by clicking on one of the dropdown filters: 

 

For example, the image below displays all critical-severity risks:

You can also search for Risks with the search bar. Note that the search only handles prefix searches, so your search must match character for character. (Tip: You can hit '/' while on any page to pull up that page's search, just like GitHub.)

 

In our Free Tier and Unmanaged Chariot offering, you will have the full capabilities of Chariot. This means you will discover, see, interact with, triage, and manage your Risks with Chariot as your guide.

If you upgrade to Chariot's Managed Service, expert security engineers will review each of your detected risks and will mark all true positives as Open

To export risks into a machine-readable format, see documentation on the CLI.

Risk details

Clicking on an individual Risk opens a drawer tab displaying additional information about the Risk:

Risk metadata is grouped in the sections below:

  • Description: This is a section that describes the vulnerability. Chariot's built-in AI will generate a synopsis of the Risk. You can also remove or edit the AI synopsis based on your needs.
  • Occurrences: This tab will show you where this specific Risk was found. 
  • Attributes: Attributes will enrich context around the Risk. You can add custom Attributes too.
  • Comment: Comments allow for in-platform communication. Comments can help manage information about the Risk and provide cross-user sync.
  • Risk History: This section details all status changes made to the risk throughout its lifetime.

Proof of Exploit

Clicking on the Proof of Exploit button  will bring up the full receipt of why Chariot and the Chariot team are confident the Risk is a true positive:

To reproduce the exploit verification in your environment, click the Copy Command button. This will copy the required command to your clipboard, which you can then paste into a terminal to run independently.

 

Praetorian is continuously adding to Chariot. If you find a topic that you would like discussed in detail, or need further assistance, please let us know at support@praetorian.com!