Ketryx automatically detects vulnerabilities in your repositories and presents them on the Vulnerabilities page within the SBOM module. The process to manage these vulnerability records is described here.
You are able to connect dependencies and vulnerabilities to items in the ALM, such as Requirements, Software Items, Risks and Tests to align your cybersecurity risk management with the other processes in the SDLC.
The Ketryx Platform presents a default risk framework that uses the same default risk assessment methodology for all risks. However, the organization owner may configure risk fields and matrices differently based on the Risk type (i.e. cybersecurity)
Comments
0 comments
Article is closed for comments.