010-4-Cyber Security: Configuration Change Management and Vulnerability Assessments
In the Reports Portal, select > > > .
This standard determines how you manage configuration changes and track vulnerabilities to protect your BES cyber system from unauthorized changes, ensuring that your organization supports and maintains appropriate cyber security requirements for your organization.
- Configuration Changes Overview
-
Provides an overview of configuration changes found on the organization.
Charts:
- Configuration Changes
- Configuration Changes by User
- Configuration Changes by Host
-
Trends
- Events Table
Filters:
- Device Vendor, Product, and Signature ID
- Agent Severity
-
- Vulnerability Overview
-
Provides information to help you track vulnerabilities reported in your enterprise.
Charts:
- Vulnerable Activity Relationship
-
Reported Vulnerabilities
-
Vulnerable Systems
-
Trends
- Events Table
Filters:
- Device Vendor, Product, and Signature ID
- Agent Severity