Vigiles Prime Tutorial: Part 2 – Triaging, Remediating and How to Get the Outcome You Want
Making Vigiles Work For You
Overview
This page will finish going through the typical Vigiles workflow. By the end of this walk-through, you should be able to efficiently filter vulnerabilities for your product, triage the results, and start applying the remediation needed for the CVEs that you prioritize and then know how to achieve the outcomes that matter to you.
Triaging Vulnerabilities So You Can Prioritize What to Fix
Vigiles already reduced most of your work by only showing vulnerabilities that apply to your build. The next step is to identify the CVEs that you want to fix or that you want to ignore by actively whitelisting.
Once your software bill of materials is scanned and your report is generated, you can filter the CVEs based on several metrics: package affected, patch or fix availability, CVE severity, custom scoring, affected platforms, whether or not you added notes or comments, and kernel and U-Boot configuration options. If you can’t find a filter that works in your triage, let us know, and we’ll look into adding it.

Filters
Use the filters in the CVE section of the report to focus on the CVEs that your organization wants to address. Try to use the kernel and U-Boot config filtering to leverage the nature of your custom build.

Add Notes
You may want to document your triage decisions in the notes. Depending on your regulatory requirements, this might be a necessary step. Keep in mind that notes on a given CVE are stored at the product level in Vigiles. All other manifests in the same product will share the same CVE note.

Whitelist
A CVE might not apply to your system (a false positive) or not be important. Whitelisting will change the CVE status to Whitelist, allowing you to focus on Unfixed CVEs. The whitelist settings are also stored at the product level and are shared across all manifests within a given product.

Custom Scoring
You can use internal or organizational metrics for CVEs and store the value here.
CVE Remediation Collaboration Tools

Team Collaboration
Manifests can be shared, enabling other team members to add notes to CVEs and to whitelist them.

Jira Integration
Vigiles can be connected to Jira so you can create an issue from within the Vigiles report interface and link it to a product manifest. You can add and delete tasks in Jira for CVE entries in your product’s Vigiles reports, as well as create and delete issues for packages.
Remediating Vulnerabilities
Once you know which CVEs you want to address, you’ll need to take action.
For all of the CVEs that are found in your scanned manifest, Vigiles will let you know if there is a fix that will remediate the vulnerability or if there is no known fix yet available.
If there is a fix for the vulnerability, Vigiles will give you the patch, minimum version, and or config option information needed to mitigate it. Links to the appropriate resources are also available in the report.

Suggested fix for OSS CVE remediation
Identifies a version of software where the CVE is fixed and/or provides links to user space patches where available

Minimum kernel version with a fix for a kernel CVE
Identification of the minimum version of a kernel with the CVE fix

Reference links to available patches, remediation, and exploits
Links to the available patch, workarounds for remediation when a patch is not available, and for recreating the CVE exploit for testing

Link to mainline kernel fix commit for Linux kernel CVEs
A direct link to the CVE fix in the mainline kernel
Using the information from these features, you can choose to upgrade, patch/backport or mitigate with a config option change.
Continuous Monitoring

Upload an updated manifest
After you’ve made kernel fixes, upload an updated manifest so you can continue tracking and compare reports.


Set Up Notification
Now that you’ve uploaded and scanned your SBOM/manifest for vulnerabilities, you can set up automatic notification of new alerts affecting your product software at your preferred cadence. You can choose to receive notification daily, weekly or monthly.


Set Up Alerts
With Vigiles, you can set up automatic alerts for non-authorized license type and for CVEs exceeding CVSS score threshold.
You can choose to receive notification of CVSS and License alerts via email or to have an issue created in Jira.

How to Achieve the Outcome You Want
These are the key takeaways from Parts 1 and 2 of your Vigiles Prime Tutorial. They provide an overview of the big picture goals around different outcomes you might be prioritizing in your search for a CVE management tool.
See only vulnerabilities relevant to my product
Use the build integration if possible. Otherwise, use the CSV manifest option, and make sure you use good package names, include versions, include patch information, and include your kernel and U-Boot config information. This will ensure you only see vulnerabilities that apply to your system.
Quickly triage CVEs so that I can address only the critical vulnerabilities
Once your software bill of materials is scanned and your report is generated, you can filter the CVEs based on several metrics: package affected, patch or fix availability, CVE severity, custom scoring, affected platforms, whether or not you added notes or comments, and kernel and U-Boot configuration options. If you can’t find a filter that works in your triage, let us know, and we’ll look into adding it.
Coordinate CVE management within my team and integrate into issue tracking systems
Each Vigiles subscription initially includes 10 seats. They will be assigned to the same team, allowing manifests to be shared and enabling other team members to add notes to CVEs and to whitelist them.
Vigiles can be connected to Jira and generate issues from within the Vigiles report interface.
Find appropriate fixes faster
For all of the CVEs that are found in your scanned manifest, Vigiles will let you know if there is a fix that will remediate the vulnerability or if there is no known fix yet available. If there is a fix for the vulnerability, Vigiles will give you the patch, minimum version, and or config option information needed to mitigate it. Links to the appropriate resources are also available in the report.
Collect changes quickly for regulatory purposes
Compare reports between builds as well as between entirely different products. You’ll get the package and vulnerability changes, and you can use this information to meet your regulatory requirements.
Easily continue monitoring for new CVEs and changes
Set up periodic scans for your manifest at a daily, weekly, or monthly cadence. When new CVEs come up, we’ll send out a link to the new report via email.
Our security team will also provide early notification of new CVEs, usually by 2 weeks ahead of the NVD.
You can also set up alerts that will be triggered based on CVSS score thresholds, custom score thresholds, or the addition of packages that have a non-authorized license type.

IN CASE YOU MISSED IT:
Getting a Software Bill of Material (SBOM)/Manifest into your account, Scanning for CVEs, and Reading and Interpreting the Scans
If you haven’t viewed Part 1 of your Vigiles Prime walk-through, you can catch up what you’ve missed at https://timesys.com/part1-vigiles-core-features/.
Get a feature walk-through that focuses on your use case.
Want to see a demo or specific features? Or discuss your use case to get a focused idea of where Vigiles fits into your workflow?
Fill out the form to schedule a complimentary 30-minute Vigiles Quick Start consultation. We’ll be happy to help answer your questions.
* Denotes required field.
Additional Resources
Timesys Vigiles User Guide Videos — YouTube Playlist
Copyright © 2018-2021 Timesys Corporation. All Rights Reserved. Privacy Policy | Cookie Policy | Support Policy | Eula | Terms of Service | Terms of Sale 



All company and product names mentioned and marks and logos used are trademarks and/or registered trademarks of their respective owners.
Translate


