Exploring and Managing Risks Exploring and Managing Risks

Exploring and Managing Risks

What are risks?

Risks represent exploitable weaknesses in your environment. Examples of risks include software vulnerabilities, exposed sensitive services, misconfigurations, or hard-coded secrets. Chariot uses numerous open-source and propriety tools to detect risks in your organization. All discovered risks can be viewed and managed in the Risks tab.

Viewing and managing risks

After discovering assets, Chariot scans each asset for risks every 24 hours. All detected risks can be viewed from the Risks page:

Similar to other pages, the cards at the top show high-level counts of each risk severity/type. You can filter this view by risk type by clicking on one of the cards. For example, the image below displays all critical-severity risks:

Chariot's managed service operators will review each of your detected risks and will mark all true positives as Open

To export risks into a machine-readable format, select one of the Export options from the Actions drop-down menu. Chariot will export all selected risks into the specified file format. If no risks are selected, Chariot will export all risks in your account:

Risk details

Clicking on an individual risk opens a drawer tab displaying additional information about the risk:

Risk metadata is grouped in the sections below:

  • Risk History: This section details all status changes made to the risk throughout its lifetime.
  • Description & Remediation: This section contains information from our Managed Services team about the vulnerability and how to remediate it. 
  • Risk Details: This section provides information on the IP address, port, and URL of the risk, and when the risk was last detected.
  • Comment: This editable section contains additional context not captured in the Description & Remediation section.

Proof of Exploit

Clicking on the Proof of Exploit button from the Actions menu will bring up the full receipt of why Chariot and the Chariot team are confident the risk is a true positive:

Scroll down to view the exact request and response exchanged between Chariot and the impacted asset:

To reproduce the exploit verification in your environment, click the Copy Command button. This will copy the required command to your clipboard, which you can then paste into a terminal to run independently.


Articles in this section