Assessment

Vulnerability Assessment

Authenticated and unauthenticated scanning with prioritization and remediation tracking.

SLA
3 business days
TLP
TLP:Amber
Pricing
Per-asset
Eligible
Govt · CI · Enterprise

Overview

Authenticated and unauthenticated scanning with prioritization and remediation tracking.

Purpose

Provide systematic, repeatable vulnerability scanning across internal and external assets, with risk-based prioritization and remediation workflow.

WorkflowInteractive Timeline

Auto-play
Step 1
Scope submission
Owner: Requester

Define targets, credentials, frequency.

Requirements

  • Asset list (CIDR / hostnames)
  • Credentials for authenticated scans (vault-stored)
  • Maintenance window for scan schedule

Required documents

  • Scan authorization
  • Asset list
  • Credential vault attestation
  • Maintenance window agreement

FAQs

CVSS 3.1 base + EPSS exploitability + asset criticality + NCSA threat intel.