How does Ketryx manage vulnerabilities as opposed to product and patient related risks?

Lee Chickering
Lee Chickering

Ketryx automatically detects vulnerabilities in your repositories and presents them on the Vulnerabilities page within the SBOM module. The process to manage these vulnerability records is described here


You are able to connect dependencies and vulnerabilities to items in the ALM, such as Requirements, Software Items, Risks and Tests to align your cybersecurity risk management with the other processes in the SDLC.


The Ketryx Platform presents a default risk framework that uses the same default risk assessment methodology for all risks. However, the organization owner may configure risk fields and matrices differently based on the Risk type (i.e. cybersecurity)

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.