# CAASM Overview

The CAASM Overview page provides asset visibility and coverage for your organization. It is a base from which you can:

  • Defend your assets
  • Identify assets you don't want, assisting attack surface reduction

You'll see your cyber asset attack surface with assets broken down by:

  1. Asset types, total assets and specific asset types
  2. Asset classes, e.g., sorted tables for Applications, Operating Systems, Cloud Resources (cyber hygiene)
  3. Asset vulnerability level, top 10 assets sorted by severity level (what needs to be addressed now)
  4. Assets with findings displayed by highest severity level for associated finding (what needs to be addressed now)
  5. Integrations that provide asset insights

CAASM Overview
CAASM Overview

# 1. Asset cards

A row of asset cards across the top of the page provides a real-time count of your organization's most common assets discovered by CAASM. These provide an understanding of what assets you have so you know what you need to protect.

CAASM selected asset
CAASM selected asset

Selecting any of the cards displays the NetSPI Platform Asset Inventory page filtered to provide focus on the selected asset class. You can see all of the different types of assets, and dig into them if you want to get details.

From there you can view Asset details for each individual asset.

# 2. Asset classes

The asset classes field groups display CAASM-discovered assets by Applications, Operating Systems, and Cloud Resources along with the instance count for each. The information accessed via these asset tables inform your understanding of your current asset hygiene. For example, you can quickly identify where you have products that have a high number of versions, indicating where you need to improve patch management or version control.

CAASM assets by asset class and name
CAASM assets by asset class and name

You can search, sort, and page through the asset tables. Selecting any of the asset classes' table rows displays the CAASM asset table, filtered for your selection. From there you can dive deeper into each asset's details.

# Applications assets

The Applications table's default display shows the asset with the highest version count first. This alerts you to the number of different versions your organization has of any asset, some of which may be out of date, etc.

CAASM application assets

Select any row in the Applications table to display the CAASM assets table, filtered to show CAASM-discovered applications.

Selecting any asset row displays its Asset details page.

# Operating system assets

The Operating Systems table's default display shows the operating system with the highest version count first. This alerts you to the number of different versions your organization has of any operation system, some of which may be out of date, etc.

CAASM operating system assets

Select any row in the Operating Systems table to display the CAASM assets table, filtered to show CAASM-discovered operating systems for your organization.

Selecting any asset row displays its Asset details page.

# Cloud resources assets

The Cloud Resources table's default display is to show the cloud resource with the highest instance count first. This alerts you to the cloud resources with the highest potential vulnerability.

CAASM operating system assets

Select any row in the Cloud Resources table to display the CAASM assets table, filtered to show CAASM-discovered cloud resources for your organization.

Selecting any asset row displays its Asset details page.

# 3. Top 10 highest severity assets

The Top 10 Highest Severity Assets table displays the top-10 CAASM-discovered assets that are causing the most risk in your environment.

Selecting any of these assets pivots to the asset's details where you gain an understanding of the vulnerabilities that live on that asset. From there, you can either remediate any vulnerabilities or completely take that host offline if it's creating too much risk.

CAASM Vulnerable Assets
CAASM Vulnerable Assets

The top 10 asset status is determined by the following vulnerability-level severity statuses in this order:

  • Urgent
  • Critical
  • High
  • Medium

The number of findings associated with each asset displays to the far right in the Finding Count column.

Selecting any asset row in the Top 10 Highest Severity Assets table displays that asset's Asset details page as illustrated below.

CAASM Top 10 asset details
CAASM Top 10 asset details

If there is more than one asset of the same type, the Asset details page lists (and links to) the other asset(s) on the Related Assets tab.

# 4. Top 10 highest severity findings

The Top 10 Highest Severity Findings table focuses on the top vulnerabilities so you gain an understanding of those vulnerabilities' breadth across the environment. Then you can develop a remediation plan.

The top-10 severe findings are associated with your CAASM-discovered assets. They are determined by the following finding severity statuses in this order:

  • Urgent
  • Critical
  • High
  • Medium

CAASM Findings by Severity
CAASM Findings by Severity

Selecting any row in the Top 10 Highest Severity Findings table displays the CAASM Findings page filtered to show the top 10 findings.

CAASM Findings page with top 10 findings
CAASM Findings page with top 10 findings

Selecting any finding row in the CAASM Findings table displays the full details for that finding on its Finding Details page.

# 5. Asset visibility by integration

The Asset Visibility by Integration field group displays the percentage of your assets that are covered by each integration. Most integrations indicate you don't have 100% of your assets covered by them.

CAASM Asset Visibility by Integration
CAASM Asset Visibility by Integration

Select one of the three integration cards to quickly view details about those integrations:

  • Enabled Integrations: Displays the number of integrations that are enabled and ready for use.
  • Working Integrations: Displays the number of integrations that are currently working and the last time they sync'd with your integrated application.
  • Failed Integrations: Displays the number of integrations that enabled but failed to sync with your integrated application on their most recent sync attempt.

Enabled Integrations
Enabled Integrations

  • If an integration fails, you can select the row in the table for that integration and begin troubleshooting it from the integration's History tab.

Failed integration's History tab
Failed integration's History tab

Some integrations represent very specific security controls. For example, CrowdStrike is an EDR solution that you install onto a endpoint, like a workstation or a laptop, that watches for malicious behavior and helps prevent and report those things. Your incident response teams can then address the malicious behavior to mitigate the damage. Most organizations want to make sure controls like CrowdStrike are on 100% of their environment.

In the Tenable example below, you can see out of 958 assets, only 10% are covered by Tenable vulnerability management's vulnerability scanner. It scans your assets, and if it's missing 90% of them, that is something you will likely want to know about and correct.

Asset coverage example
Asset coverage example

As you expand and review the Tenable integration row, you can see in this example that subnets, which is the number of networks that are included, are only 33% covered. Hovering over the Asset Visibility Breakdown line graph indicates there are two subnets currently not covered by Tenable.

Asset coverage example
Asset coverage example

From here you can ensure you get 100% coverage where it's currently lacking to so that you have the coverage you really need for both security and compliance reasons.

Expand and select any asset row in the Asset Count by Integration Type table to view it in the CAASM Assets table, as illustrated below.

CAASM Asset table
CAASM Asset table