Overview
Track and reduce risk with a practical exposure workflow
Risks
Document, prioritize, and track business and security risks
Scans
Track when and how security scans were executed
Vulnerabilities
Track known weaknesses and remediation timelines
Findings
Capture specific security issues discovered during scans and reviews
Remediations
Track planned and completed fixes for vulnerabilities and findings