Skip to main content
Skip table of contents

Vulnerability Scanning - Overview

This page provides an overview of Cloudaware’s Vulnerability Scanning capabilities.

About

Cloudaware Vulnerability Scanning as a Service (VSaaS) is a comprehensive, low-friction, high-value security scanning solution. Vulnerability data is accessible directly within the Cloudaware CMDB.

Supported Scan Types

The following scan types are supported by Cloudaware:

Agent-Based Vulnerability Scans (Default)

  • Standard

  • PCI DSS (Windows and Red Hat only)

IP-Based Network Scans (Optional)

  • Standard

  • Standard Credentialed

  • PCI DSS (Windows and Red Hat only)

URL Scanning

  • OWASP Top 10 vulnerability scanning

Docker Image Scanning

Compliance Benchmarks

  • CIS Level 1, Level 2, and Custom

  • DISA

  • HIPAA Windows Audit

  • PCI DSS (Agent and IP-based)

  • SCAP

  • OVAL

  • MSCT

Vulnerability-Specific Scanning

  • BadLock

  • Bash Shellshock

  • DROWN

  • Intel AMT Security Bypass

  • Shadow Brokers

  • Spectre

  • Meltdown

  • WannaCry (Ransomware)

Other Capabilities

  • Patch Audit

  • Malware Detection

  • Mobile Device Discovery

  • Host Discovery

Scan Frequency and Scheduling

All scans are performed at least once every 7 days. The Cloudaware VSaaS algorithm automatically selects the optimal time to scan each asset. Customers may request on-demand scans at any time.

If a scanning agent is uninstalled or impaired, Breeze automatically performs a clean uninstall, repairs the agent if necessary, and reinstalls it.

CMDB Integration

  1. Each Configuration Item (CI) in the CMDB includes a Last Scan Date field. Using CMDB reporting and workflow functionality, customers can:

    • Generate reports identifying unscanned assets

    • Create workflows to handle unscanned asset notifications

  2. Each CI also includes fields indicating the number of Critical, High, Medium, and Low risk vulnerabilities associated with the asset.

  3. Vulnerability data is accessible directly in the CMDB.

  4. Customers can create workflows triggered when vulnerabilities are discovered or remediated.

  5. Customers can build dashboards tracking KPIs such as scanning coverage and vulnerability age.

  6. Customers can generate reports showing assets that are not being scanned or that have critical vulnerabilities exceeding a defined age.

  7. Customers can create CVE-specific reports identifying assets vulnerable to particular CVEs.

Using Cloudaware CMDB reporting, dashboarding, and advanced analytics, customers can review KPIs (for example, scanning coverage and vulnerability age), track assets affected by specific vulnerabilities or CVEs, and monitor vulnerabilities over time.

Ticketing and Incident Management Integration

Cloudaware VSaaS integrates with external systems such as ServiceNow, Jira, and PagerDuty.

Stateful ticketing integration is supported, meaning tickets are not only created in external systems but are also automatically updated when vulnerabilities are remediated.

List of supported objects

Cloudaware supports the following scanning-related objects (with API names):

  • CloudAware Scan Server CA10__CaNessusPhysicalServer__c

  • CloudAware Vulnerability Scan CA10__CaNessusVulnerability__c

  • CloudAware Vulnerability Scan CVE CA10__CaNessusVulnerabilityCve__c

  • Docker Runtime Vulnerability CA10__CaDockerRuntimeVulnerability__c

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.