You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/build-your-software-catalog/sync-data-to-catalog/cloud-providers/aws-v3/Overview.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,10 +9,6 @@ import MetricsAndSyncStatus from "/docs/build-your-software-catalog/sync-data-to
9
9
10
10
# Overview
11
11
12
-
:::warning Beta Feature
13
-
AWS Hosted by Port is currently in **beta mode** and is not yet available for all Port users. Contact Port's support team to get access to this integration.
14
-
:::
15
-
16
12
Port's AWS Hosted by Port integration allows you to import your AWS resources into Port with **zero maintenance required**. The integration is fully hosted and managed by Port, providing a seamless experience for discovering and managing your AWS infrastructure.
17
13
18
14
The integration periodically syncs your AWS resources to ensure your Port catalog stays up-to-date with your AWS infrastructure.
Copy file name to clipboardExpand all lines: docs/build-your-software-catalog/sync-data-to-catalog/cloud-providers/aws-v3/installations.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,6 @@ import TabItem from "@theme/TabItem";
7
7
8
8
# Installation
9
9
10
-
:::warning Beta Feature
11
-
AWS Hosted by Port is currently in **beta mode** and is not yet available for all Port users. Contact Port's support team to get access to this integration.
12
-
:::
13
10
14
11
AWS Hosted by Port is available through [Port's Ocean SaaS framework](https://ocean.getport.io/integrations-library/).
Copy file name to clipboardExpand all lines: docs/solutions/security/prioritise-vulnerabilities.md
+85-35Lines changed: 85 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,14 +9,22 @@ sidebar_position: 2
9
9
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
10
10
:::
11
11
12
+
12
13
## Executive summary
13
14
15
+
16
+
Port turns vulnerability management from a chaotic, reactive process into a business-first security capability. By unifying all types of vulnerabilities, enriching them with business context, and enabling API and automation-driven prioritization, Port ensures you fix what matters—fast, strategically, and sustainably.
17
+
14
18
Modern security teams face an impossible task: thousands of vulnerabilities discovered daily across code, infrastructure, cloud, and open source dependencies. Without business context, every issue appears urgent, leading to **alert fatigue**, wasted resources, and dangerous blind spots.
15
19
20
+
:::tip Transform vulnerability management
21
+
Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.
22
+
:::
23
+
16
24
Port solves this by **anchoring vulnerability management to business context**.
17
-
Instead of starting with raw scanner data, Port starts with what matters most: your services, their owners, their environments, and their business impact.
18
-
This context powers:
25
+
Instead of starting with raw scanner data, Port starts with what matters most; your services, their owners, their environments, and their business impact.
19
26
27
+
This context powers:
20
28
-**Unified visibility** – All vulnerabilities from all scanners in a single platform.
21
29
-**Risk-based prioritization** – Focus on vulnerabilities that truly impact production and revenue.
22
30
-**Automated workflows** – Route issues to the right teams with the right urgency.
@@ -28,12 +36,6 @@ The result: Security teams fix the **right vulnerabilities** faster, while devel
28
36
29
37
Port integrates with your existing security stack, automatically ingesting vulnerability data, enriching it with business context, and prioritizing it for action.
30
38
31
-
<!-- TO-Do -->
32
-
<!-- Mermaid graph -->
33
-
34
-
:::tip Transform vulnerability management
35
-
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
36
-
:::
37
39
38
40
## Introduction
39
41
@@ -66,48 +68,103 @@ Many organizations fall into common traps. Here's how they go wrong—and how Po
66
68
67
69
Port transforms vulnerability data into actionable intelligence by anchoring it directly to business context:
68
70
69
-
### 1. Unified context via software catalog
71
+
### Unified context via software catalog
70
72
71
73
- Use **blueprints, relations, and entities** to represent services, ownership, criticality, environments, and compliance scope.
72
74
- Integrate with tools like **Trivy, Wiz, Dependabot, Orca, Snyk**, etc., to ingest vulnerabilities into Port with service links.
73
75
- Leverage **API ingestion** for custom tools or vulnerability sources, using Port's REST API to create/update vulnerability entities linked to services.
74
76
75
-
### 2. Business context enrichment
77
+
The catalog view below shows Port’s business-first approach in action: findings from many sources (Dependabot, Veracode, Trivy, Snyk, Semgrep, pen-tests, manual review) are normalized into one table and **linked to services in the software catalog** (e.g., *User Authentication Service*, *Customer Portal*). Catalog context—service criticality, data class, environment, ownership, dependencies—feeds the **Business Impact** label and rolls up into a single **Business Risk Score** that orders the queue (Log4j RCE at 100 down to a hard-coded key at 30).
78
+
79
+
Duplicates are collapsed, policy choices are explicit via **Accepted Risk** (e.g., legacy Windows 2012 R2 = True), and every row carries the metadata needed to route to the right team and meet SLAs/compliance scope. Net: Port prioritizes what matters to the business, not just raw CVEs, by unifying vulnerability data with rich catalog context into one actionable triage view.
80
+
81
+
-**One view, all sources:** Dependabot, Veracode, Trivy, Snyk, Semgrep, pen-tests, manual reviews—normalized into a single table.
82
+
-**Catalog context applied:** Each finding is tied to the service in Port’s software catalog (criticality, data class, environment, ownership, dependencies).
83
+
-**Business-first scoring:** Context drives **Business Impact** and a unified **Business Risk Score** that orders the queue.
84
+
-**De-duped + clean:** Duplicates collapsed so teams don’t chase the same issue twice.
- Vulnerabilities are enriched with metadata like **service ownership, environment (prod, staging), business criticality, data sensitivity, compliance implications**, and recent change status.
78
95
- This enables answering: *Which vulnerabilities threaten our revenue-critical production systems?*
79
96
80
-
### 3. Real-time dashboards & scorecards
97
+
Below dashboard views show how port enriches vulnerabilities with business context—so decisions tie back to impact and ownership:
98
+
-**360° linking:** Connects the vuln to **incidents, audit evidence, controls, teams, services, and users** in one place.
99
+
-**Clear ownership & freshness:** Team rows show **owners** and **last update** dates for accountable routing.
100
+
-**Blast radius:** Calls out **affected component**`log4j-core-2.14.1.jar`, **services** (e.g., payment/notification), and **version**.
101
+
-**Customer & SLA signals:****SLA expiry** and **Affects customer data** turn technical risk into business urgency.
102
+
-**Control & audit traceability:** Direct links to **controls**, **evidence**, and **audit log** for defensible proof.
103
+
-**Executive-ready scorecards:** Badges (e.g., **Priority = Gold**, **Remediation = Gold**, **Trend Analysis = Bronze**) translate status into maturity at a glance.
104
+
***Prioritization ready:** Ownership + impact + compliance + SLA context produce a **business-first, fix-next** call.
- Build dashboards to track vulnerabilities by severity, status, team, or service using Port's UI and widget capabilities.
83
112
- Track maturity with **scorecards**, showing metrics like mean time to remediation (MTTR), percentage of services with owners, or open critical vulnerabilities over time, using Port's scorecard feature.
84
113
85
-
### 4. Automation & context-aware workflows
114
+
Port turns your live security data into **real-time dashboards and executive scorecards**. These dashboards and scorecards answer “how many, how old, how risky, and how ready” an organization is with their security capabilities. The views show current load (**15 open vulns**, **5 business-impacting**), how long items stay open, which types are spiking, and program health with simple badges (Gold/Bronze/Basic) for readiness, prioritization, risk assessment, and lifecycle discipline.
115
+
116
+
-**Live KPIs:** “Total Open Vulnerabilities,” “Business-Impacting Vulnerabilities,” and “Days Open” update as scanners and tickets change.
117
+
-**Trends that guide action:** Type trends (e.g., misconfig vs. info disclosure) highlight surges and where to focus teams.
118
+
-**SLA visibility:** “Remediation SLA Trend” shows pace and potential breaches—useful for leadership and customers.
119
+
-**Scorecards at a glance:** Remediation Readiness, Priority Management, Risk Assessment, and Lifecycle Management surface maturity with **Gold/Bronze/Basic** badges—executive-readable, audit-friendly.
120
+
-**Business-aware slices:** Filter by service, environment, team, or customer tier from the catalog to get the exact view each stakeholder needs.
121
+
-**Drill-through workflow:** Jump from a metric to the underlying vulnerabilities, owners, and affected services for fast routing.
122
+
-**Shareable, consistent:** Common widgets keep weekly reviews, CISO reports, and auditor asks aligned to the same live truth.
- Define automations to **escalate high-priority issues**, such as when a vulnerability in a customer-facing prod service becomes critical.
88
131
- Build self-service actions to create tickets in Jira, Slack alerts, or trigger remediation workflows—only where business risk justifies action.
89
132
- Use Port's API and mapping layers to tailor behavior—e.g., API-driven rules, triage pipelines, or dynamic SLAs.
90
133
91
-
### 5. API-driven integration & extensibility
134
+
Port turns security policy into **automation that reacts to context**: scorecards like *Vulnerability Priority Management* continuously evaluate rules against the live software catalog—showing what passed (e.g., **98.67%**, **75 rules**) and how compliance trends over time—then trigger the right workflow when something slips.
135
+
136
+
-**Policy-as-code:** Rules reference service criticality, data class, SLA, env, and ownership to decide priority and action.
137
+
-**Auto-evaluation:** The **Runs** tab reflects scheduled/triggered executions on ingest, PRs, deploys, or scanner updates.
138
+
-**Action on fail:** Pass/fail thresholds create Jira tickets, ping Slack, open incidents, or block changes for high-risk gaps.
139
+
-**Context-aware routing:** Violations auto-assign to the owning **team/service** with links to related controls, evidence, and incidents.
140
+
-**Time-series guardrails:** “% of rules passed over time” exposes drift and proves continuous compliance to leadership/auditors.
- Automate service metadata updates from CI/CD, incident systems, or IaC pipelines, keeping business context fresh.
95
152
96
153
## Putting it into practice: a practical workflow
97
154
98
-
1.**Set up your software catalog** with service metadata (ownership, criticality, compliance, environments) and vulnerability blueprints (e.g., Trivy, Wiz).
99
-
2.**Ingest vulnerabilities** via native integrations or API into Port, linking them to the relevant service entities.
100
-
3.**Create dashboards** to visualize the active threat landscape in context (e.g., “Critical findings in production, by service owner”).
101
-
4.**Define priority scoring** combining severity with business context—for instance:
102
-
- Production service = +100
103
-
- High revenue impact = +50
104
-
- Customer data involved = +30
105
-
- Known-exploited = +70
106
-
5.**Automate workflows**:
155
+
-**Set up your software catalog** with service metadata (ownership, criticality, compliance, environments) and vulnerability blueprints (e.g., Trivy, Wiz).
156
+
-**Ingest vulnerabilities** via native integrations or API into Port, linking them to the relevant service entities.
157
+
-**Create dashboards** to visualize the active threat landscape in context (e.g., “Critical findings in production, by service owner”).
158
+
-**Define priority scoring** combining severity with business context—for instance:
159
+
- Production service = +100.
160
+
- High revenue impact = +50.
161
+
- Customer data involved = +30.
162
+
- Known-exploited = +70.
163
+
-**Automate workflows**:
107
164
- Immediately notify owners when score exceeds threshold.
108
165
- Escalate top-10 findings to leadership daily.
109
166
- Create tickets and set different SLA windows based on business tier.
110
-
6.**Track progress with scorecards**:
167
+
-**Track progress with scorecards**:
111
168
- Average remediation time for production-ranked vulnerabilities.
112
169
- % of services with defined ownership.
113
170
- Trend of high-risk vulnerabilities over time.
@@ -116,16 +173,9 @@ Port transforms vulnerability data into actionable intelligence by anchoring it
116
173
117
174
By using Port's business-context-driven approach to vulnerability prioritization, organizations achieve:
118
175
119
-
-**50%+ reduction** in wasted remediation time
120
-
-**Faster MTTR on truly critical issues**
121
-
-**Improved developer experience** with context-aware, actionable findings
122
-
-**Better alignment** between security, product, and engineering teams
123
-
-**Higher trust and accountability**, backed by dashboards and scorecards
124
-
125
-
## Summary
126
-
127
-
Port turns vulnerability management from a chaotic, reactive process into a business-first security capability. By unifying all types of vulnerabilities, enriching them with business context, and enabling API and automation-driven prioritization, Port ensures you fix what matters—fast, strategically, and sustainably.
176
+
-**50%+ reduction** in wasted remediation time.
177
+
-**Faster MTTR on truly critical issues**.
178
+
-**Improved developer experience** with context-aware, actionable findings.
179
+
-**Better alignment** between security, product, and engineering teams.
180
+
-**Higher trust and accountability**, backed by dashboards and scorecards.
128
181
129
-
:::tip Transform vulnerability management
130
-
**Port transforms vulnerability management from chaos to clarity — helping security teams focus on what truly matters to the business.**
0 commit comments