Vulnerability Management Process
Step 1: The user creates a playbook to run a vulnerability scan every month.
Step 2: D3 initiates the scheduled vulnerability scan in an integrated tool, such as Tenable.
Step 3: D3 retrieves the report once the scan is complete.
Step 4: D3 parses the results of the report and generates an enriched email with the important information.
Step 5: The email is sent to the appropriate team(s)—such as Engineering, Infrastructure, or NOC—who can complete the necessary tasks to remediate the vulnerabilities.
Benefits of Automated Vulnerability Management
✔ Never Forget to Scan for Vulnerabilities
D3 can schedule reoccurring vulnerability scans via integrated tools so that vulnerabilities never build up because someone forgot to run a monthly scan.
✔ Make Sense of Scan Results
Vulnerability scans in tools like Tenable Nessus generate tons of data about endpoints, software updates, and more. D3 ingests and parses the results of scans automatically to find the important information.
✔ Automate Patch Management
If you have scripts for patch management, D3’s playbooks can trigger them directly based on vulnerability scan results.
✔ Bridge the Gap Between Teams
Vulnerability remediation and incident response are rarely handled by the same team. D3 parses vulnerability reports and automatically sends the results to the appropriate stakeholders.