Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Qualys is a cloud-based solution that detects vulnerabilities on all networked assets, including servers, network devices (e.g. routers, switches, firewalls, etc.), peripherals (such as IP-based printers or fax machines) and workstations.

...

Cloudaware CMDB and Breeze Agent agent support Qualys Vulnerability Scanning Service. The integration supports several distinct use cases:

...

Qualys As Datasource

Cloudaware is a CMDB service that supports AWS, Azure, and GCE cloud providersGoogle Cloud. Cloudaware enhances CMDB inventory data using Qualys API.

For example, for every EC2, Azure and GCE instance, Cloudaware will use Qualys API to ascertain the Last Scan Date of the any instance in question. Using this example, CMDB users can build a report of showing instances that are not getting scanned at all or have not been scanned in a long time.

Here is a complete list of fields and items that Cloudaware either extracts from Qualys or calculates based on the extracted data:

...

Cloudaware enhances the following CMDB object types with data from Qualys:

  • AWS EC2 Instance

  • Azure VM

  • Azure Scale Set VM

  • GCE Instance

  • Physical Server

  • VMWare Virtual Machine

In addition, complete vulnerability scan results for every asset are also downloaded into CMDB. Vulnerabilities contain all standard fields from Qualys, such as CVSS Base Score, Risk, Remediation Instructions, Impact, etc. CMDB users can now build reports using report types such as AWS EC2 Instances With Cloudaware Vulnerabilities, for example.

Key Benefits

  • Measure Scan Coverage: identify unscanned instances or instances that have not been scanned in a long time.

  • Create vulnerability reports that combine data from Qualys, data from cloud provider providers and other CMDB data, e.g. group critical vulnerabilities , by AWS account owner or application, or combine vulnerability data filtered by cloud provider tags.

  • Establish other key KPI KPIs, such as MTTR and Scan Frequency.

  • Establish a complete risk profile by identifying instances with critical vulnerabilities that are also in permissive/public security groups, subnets, VPCs.

...