Skip to content

Commit e6bb7f5

Browse files
authored
Merge branch 'main' into dependabot/github_actions/actions/setup-node-6
2 parents 1e803f9 + d76275f commit e6bb7f5

30 files changed

+310
-175
lines changed

.cursor/rules/documentation_style.mdc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,4 @@
22
description:
33
globs:
44
alwaysApply: false
5-
---
6-
5+
---

docs/build-your-software-catalog/sync-data-to-catalog/cloud-providers/aws-v3/Overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ import MetricsAndSyncStatus from "/docs/build-your-software-catalog/sync-data-to
99

1010
# Overview
1111

12-
:::warning Beta Feature
13-
AWS Hosted by Port is currently in **beta mode** and is not yet available for all Port users. Contact Port's support team to get access to this integration.
14-
:::
15-
1612
Port's AWS Hosted by Port integration allows you to import your AWS resources into Port with **zero maintenance required**. The integration is fully hosted and managed by Port, providing a seamless experience for discovering and managing your AWS infrastructure.
1713

1814
The integration periodically syncs your AWS resources to ensure your Port catalog stays up-to-date with your AWS infrastructure.

docs/build-your-software-catalog/sync-data-to-catalog/cloud-providers/aws-v3/installations.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,6 @@ import TabItem from "@theme/TabItem";
77

88
# Installation
99

10-
:::warning Beta Feature
11-
AWS Hosted by Port is currently in **beta mode** and is not yet available for all Port users. Contact Port's support team to get access to this integration.
12-
:::
1310

1411
AWS Hosted by Port is available through [Port's Ocean SaaS framework](https://ocean.getport.io/integrations-library/).
1512

docs/solutions/security/compliance-as-code.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ sidebar_position: 5
1212
## Introduction
1313

1414
Compliance is critical, but most organizations still rely on outdated, manual methods:
15-
- **Spreadsheets** to track controls and audit status,
16-
- **Email threads** to gather evidence,
15+
- **Spreadsheets** to track controls and audit status.
16+
- **Email threads** to gather evidence.
1717
- **Periodic checklists** disconnected from production systems.
1818

1919
This creates **painful audits**, stale evidence, and gaps between what's documented and what's actually happening in production.
@@ -71,8 +71,8 @@ With Port:
7171
- *Audit Evidence* – proof items such as logs, screenshots, or test reports.
7272
- Link services to their controls using **relations**.
7373
- Tag services with key metadata:
74-
- Regulatory scope (SOC 2, PCI, HIPAA, GDPR),
75-
- Data sensitivity (PII, payment data, internal-only),
74+
- Regulatory scope (SOC 2, PCI, HIPAA, GDPR).
75+
- Data sensitivity (PII, payment data, internal-only).
7676
- Criticality (customer-facing, revenue-generating, internal).
7777

7878
This creates a **single source of truth** for compliance across the organization.
@@ -115,13 +115,13 @@ Scorecards turn abstract frameworks into **measurable, trackable outcomes**.
115115
| Logging & Monitoring | Centralized logging enabled for services | Cloud logging integrations |
116116

117117
Each control:
118-
- Is a **scorecard item** with pass/fail logic,
119-
- Is linked to services and teams,
118+
- Is a **scorecard item** with pass/fail logic.
119+
- Is linked to services and teams.
120120
- Updates automatically when integrated systems change.
121121

122122
Dashboards then show:
123-
- Compliance by control area,
124-
- Overall readiness by service or business unit,
123+
- Compliance by control area.
124+
- Overall readiness by service or business unit.
125125
- Historical progress over time.
126126

127127
## Step 4: automate compliance workflows

docs/solutions/security/prioritise-vulnerabilities.md

Lines changed: 85 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,22 @@ sidebar_position: 2
99
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
1010
:::
1111

12+
1213
## Executive summary
1314

15+
16+
Port turns vulnerability management from a chaotic, reactive process into a business-first security capability. By unifying all types of vulnerabilities, enriching them with business context, and enabling API and automation-driven prioritization, Port ensures you fix what matters—fast, strategically, and sustainably.
17+
1418
Modern security teams face an impossible task: thousands of vulnerabilities discovered daily across code, infrastructure, cloud, and open source dependencies. Without business context, every issue appears urgent, leading to **alert fatigue**, wasted resources, and dangerous blind spots.
1519

20+
:::tip Transform vulnerability management
21+
Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.
22+
:::
23+
1624
Port solves this by **anchoring vulnerability management to business context**.
17-
Instead of starting with raw scanner data, Port starts with what matters most: your services, their owners, their environments, and their business impact.
18-
This context powers:
25+
Instead of starting with raw scanner data, Port starts with what matters most; your services, their owners, their environments, and their business impact.
1926

27+
This context powers:
2028
- **Unified visibility** – All vulnerabilities from all scanners in a single platform.
2129
- **Risk-based prioritization** – Focus on vulnerabilities that truly impact production and revenue.
2230
- **Automated workflows** – Route issues to the right teams with the right urgency.
@@ -28,12 +36,6 @@ The result: Security teams fix the **right vulnerabilities** faster, while devel
2836

2937
Port integrates with your existing security stack, automatically ingesting vulnerability data, enriching it with business context, and prioritizing it for action.
3038

31-
<!-- TO-Do -->
32-
<!-- Mermaid graph -->
33-
34-
:::tip Transform vulnerability management
35-
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
36-
:::
3739

3840
## Introduction
3941

@@ -66,48 +68,103 @@ Many organizations fall into common traps. Here's how they go wrong—and how Po
6668

6769
Port transforms vulnerability data into actionable intelligence by anchoring it directly to business context:
6870

69-
### 1. Unified context via software catalog
71+
### Unified context via software catalog
7072

7173
- Use **blueprints, relations, and entities** to represent services, ownership, criticality, environments, and compliance scope.
7274
- Integrate with tools like **Trivy, Wiz, Dependabot, Orca, Snyk**, etc., to ingest vulnerabilities into Port with service links.
7375
- Leverage **API ingestion** for custom tools or vulnerability sources, using Port's REST API to create/update vulnerability entities linked to services.
7476

75-
### 2. Business context enrichment
77+
The catalog view below shows Port’s business-first approach in action: findings from many sources (Dependabot, Veracode, Trivy, Snyk, Semgrep, pen-tests, manual review) are normalized into one table and **linked to services in the software catalog** (e.g., *User Authentication Service*, *Customer Portal*). Catalog context—service criticality, data class, environment, ownership, dependencies—feeds the **Business Impact** label and rolls up into a single **Business Risk Score** that orders the queue (Log4j RCE at 100 down to a hard-coded key at 30).
78+
79+
Duplicates are collapsed, policy choices are explicit via **Accepted Risk** (e.g., legacy Windows 2012 R2 = True), and every row carries the metadata needed to route to the right team and meet SLAs/compliance scope. Net: Port prioritizes what matters to the business, not just raw CVEs, by unifying vulnerability data with rich catalog context into one actionable triage view.
80+
81+
- **One view, all sources:** Dependabot, Veracode, Trivy, Snyk, Semgrep, pen-tests, manual reviews—normalized into a single table.
82+
- **Catalog context applied:** Each finding is tied to the service in Port’s software catalog (criticality, data class, environment, ownership, dependencies).
83+
- **Business-first scoring:** Context drives **Business Impact** and a unified **Business Risk Score** that orders the queue.
84+
- **De-duped + clean:** Duplicates collapsed so teams don’t chase the same issue twice.
85+
- **Explicit risk decisions:** **Accepted Risk** captured (e.g., legacy tech), making policy tradeoffs visible.
86+
- **Right team, right SLA:** Ownership and scope metadata enable fast routing and compliance alignment.
87+
- **Outcome:** You work the items that matter most to the business—quickly and confidently.
88+
89+
90+
<img src='/img/guides/security-solution/vuln-catalog.png' alt='Vulnerability catalog' width='80%' border='1px' />
91+
92+
### Business context enrichment
7693

7794
- Vulnerabilities are enriched with metadata like **service ownership, environment (prod, staging), business criticality, data sensitivity, compliance implications**, and recent change status.
7895
- This enables answering: *Which vulnerabilities threaten our revenue-critical production systems?*
7996

80-
### 3. Real-time dashboards & scorecards
97+
Below dashboard views show how port enriches vulnerabilities with business context—so decisions tie back to impact and ownership:
98+
- **360° linking:** Connects the vuln to **incidents, audit evidence, controls, teams, services, and users** in one place.
99+
- **Clear ownership & freshness:** Team rows show **owners** and **last update** dates for accountable routing.
100+
- **Blast radius:** Calls out **affected component** `log4j-core-2.14.1.jar`, **services** (e.g., payment/notification), and **version**.
101+
- **Customer & SLA signals:** **SLA expiry** and **Affects customer data** turn technical risk into business urgency.
102+
- **Control & audit traceability:** Direct links to **controls**, **evidence**, and **audit log** for defensible proof.
103+
- **Executive-ready scorecards:** Badges (e.g., **Priority = Gold**, **Remediation = Gold**, **Trend Analysis = Bronze**) translate status into maturity at a glance.
104+
* **Prioritization ready:** Ownership + impact + compliance + SLA context produce a **business-first, fix-next** call.
105+
106+
<img src='/img/guides/security-solution/vuln-context.png' alt='Vulnerability context - users' width='80%' border='1px' />
107+
<img src='/img/guides/security-solution/vuln-context-teams.png' alt='Vulnerability context - users' width='80%' border='1px' />
108+
109+
### Real-time dashboards & scorecards
81110

82111
- Build dashboards to track vulnerabilities by severity, status, team, or service using Port's UI and widget capabilities.
83112
- Track maturity with **scorecards**, showing metrics like mean time to remediation (MTTR), percentage of services with owners, or open critical vulnerabilities over time, using Port's scorecard feature.
84113

85-
### 4. Automation & context-aware workflows
114+
Port turns your live security data into **real-time dashboards and executive scorecards**. These dashboards and scorecards answer “how many, how old, how risky, and how ready” an organization is with their security capabilities. The views show current load (**15 open vulns**, **5 business-impacting**), how long items stay open, which types are spiking, and program health with simple badges (Gold/Bronze/Basic) for readiness, prioritization, risk assessment, and lifecycle discipline.
115+
116+
- **Live KPIs:** “Total Open Vulnerabilities,” “Business-Impacting Vulnerabilities,” and “Days Open” update as scanners and tickets change.
117+
- **Trends that guide action:** Type trends (e.g., misconfig vs. info disclosure) highlight surges and where to focus teams.
118+
- **SLA visibility:** “Remediation SLA Trend” shows pace and potential breaches—useful for leadership and customers.
119+
- **Scorecards at a glance:** Remediation Readiness, Priority Management, Risk Assessment, and Lifecycle Management surface maturity with **Gold/Bronze/Basic** badges—executive-readable, audit-friendly.
120+
- **Business-aware slices:** Filter by service, environment, team, or customer tier from the catalog to get the exact view each stakeholder needs.
121+
- **Drill-through workflow:** Jump from a metric to the underlying vulnerabilities, owners, and affected services for fast routing.
122+
- **Shareable, consistent:** Common widgets keep weekly reviews, CISO reports, and auditor asks aligned to the same live truth.
123+
124+
<img src='/img/guides/security-solution/vuln-stats.png' alt='Vulnerability stats' width='80%' border='1px' />
125+
126+
<img src='/img/guides/security-solution/vuln-trends.png' alt='Vulnerability trends' width='80%' border='1px' />
127+
128+
### Automation & context-aware workflows
86129

87130
- Define automations to **escalate high-priority issues**, such as when a vulnerability in a customer-facing prod service becomes critical.
88131
- Build self-service actions to create tickets in Jira, Slack alerts, or trigger remediation workflows—only where business risk justifies action.
89132
- Use Port's API and mapping layers to tailor behavior—e.g., API-driven rules, triage pipelines, or dynamic SLAs.
90133

91-
### 5. API-driven integration & extensibility
134+
Port turns security policy into **automation that reacts to context**: scorecards like *Vulnerability Priority Management* continuously evaluate rules against the live software catalog—showing what passed (e.g., **98.67%**, **75 rules**) and how compliance trends over time—then trigger the right workflow when something slips.
135+
136+
- **Policy-as-code:** Rules reference service criticality, data class, SLA, env, and ownership to decide priority and action.
137+
- **Auto-evaluation:** The **Runs** tab reflects scheduled/triggered executions on ingest, PRs, deploys, or scanner updates.
138+
- **Action on fail:** Pass/fail thresholds create Jira tickets, ping Slack, open incidents, or block changes for high-risk gaps.
139+
- **Context-aware routing:** Violations auto-assign to the owning **team/service** with links to related controls, evidence, and incidents.
140+
- **Time-series guardrails:** “% of rules passed over time” exposes drift and proves continuous compliance to leadership/auditors.
141+
- **Exception handling:** Waivers with expiries keep risk decisions explicit—no silent ignores.
142+
- **Audit-ready:** **Audit Log** preserves who/what/when for every rule run and action taken.
143+
- **Reusable widgets:** Drop the scorecard into any dashboard for real-time, executive-readable status.
144+
- **Example:** **Critical service** + **customer data** + **vulnerability** > **SLA**`rule fails``Slack + Jira` notification to owner ⇒ change status to blocked until fixed.
145+
146+
<img src='/img/guides/security-solution/vuln-rules.png' alt='Vulnerability rules' width='80%' border='1px' />
147+
148+
### API-driven integration & extensibility
92149

93150
- Port's **REST API** supports managing blueprints, entities, scorecards, and actions programmatically.
94151
- Automate service metadata updates from CI/CD, incident systems, or IaC pipelines, keeping business context fresh.
95152

96153
## Putting it into practice: a practical workflow
97154

98-
1. **Set up your software catalog** with service metadata (ownership, criticality, compliance, environments) and vulnerability blueprints (e.g., Trivy, Wiz).
99-
2. **Ingest vulnerabilities** via native integrations or API into Port, linking them to the relevant service entities.
100-
3. **Create dashboards** to visualize the active threat landscape in context (e.g., “Critical findings in production, by service owner”).
101-
4. **Define priority scoring** combining severity with business context—for instance:
102-
- Production service = +100
103-
- High revenue impact = +50
104-
- Customer data involved = +30
105-
- Known-exploited = +70
106-
5. **Automate workflows**:
155+
- **Set up your software catalog** with service metadata (ownership, criticality, compliance, environments) and vulnerability blueprints (e.g., Trivy, Wiz).
156+
- **Ingest vulnerabilities** via native integrations or API into Port, linking them to the relevant service entities.
157+
- **Create dashboards** to visualize the active threat landscape in context (e.g., “Critical findings in production, by service owner”).
158+
- **Define priority scoring** combining severity with business context—for instance:
159+
- Production service = +100.
160+
- High revenue impact = +50.
161+
- Customer data involved = +30.
162+
- Known-exploited = +70.
163+
- **Automate workflows**:
107164
- Immediately notify owners when score exceeds threshold.
108165
- Escalate top-10 findings to leadership daily.
109166
- Create tickets and set different SLA windows based on business tier.
110-
6. **Track progress with scorecards**:
167+
- **Track progress with scorecards**:
111168
- Average remediation time for production-ranked vulnerabilities.
112169
- % of services with defined ownership.
113170
- Trend of high-risk vulnerabilities over time.
@@ -116,16 +173,9 @@ Port transforms vulnerability data into actionable intelligence by anchoring it
116173

117174
By using Port's business-context-driven approach to vulnerability prioritization, organizations achieve:
118175

119-
- **50%+ reduction** in wasted remediation time
120-
- **Faster MTTR on truly critical issues**
121-
- **Improved developer experience** with context-aware, actionable findings
122-
- **Better alignment** between security, product, and engineering teams
123-
- **Higher trust and accountability**, backed by dashboards and scorecards
124-
125-
## Summary
126-
127-
Port turns vulnerability management from a chaotic, reactive process into a business-first security capability. By unifying all types of vulnerabilities, enriching them with business context, and enabling API and automation-driven prioritization, Port ensures you fix what matters—fast, strategically, and sustainably.
176+
- **50%+ reduction** in wasted remediation time.
177+
- **Faster MTTR on truly critical issues**.
178+
- **Improved developer experience** with context-aware, actionable findings.
179+
- **Better alignment** between security, product, and engineering teams.
180+
- **Higher trust and accountability**, backed by dashboards and scorecards.
128181

129-
:::tip Transform vulnerability management
130-
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
131-
:::

0 commit comments

Comments
 (0)