Skip to main content

RiskSense

Download With Dependencies

RiskSense is a cloud-based platform that provides vulnerability management and prioritization to measure and control cybersecurity risk.

Overview

RiskSense provides vulnerability management, assessment, and response to changes in the environment while prioritizing risk across vulnerabilities, configurations, and controls.

Our objective is to integrate with Cortex XSOAR and address use-cases such as:

Aggregation - make RiskSense a source for data ingestion especially as a threat intelligence source in context of a customer’s infrastructure.

Enrichment - be able to enrich security and threat centric data for an incident or during data collection and processing.

Orchestration and Automation - provide functions and capabilities to allow for RiskSense data to be used in creating playbooks for vulnerability management either as a standalone data source or in conjunction with other software and solutions.

Use-Cases

Automated Vulnerability Enrichment and Context Addition

With the Cortex XSOAR-RiskSense integration, security orchestration playbooks can benefit from ingesting and enriching host vulnerability information along with other custom fields such as a host risk score and vulnerability risk rating to help security operations prioritize and remediate vulnerabilities. RiskSense integration can provide all necessary data to security analyst to help make their decision based on actual risk.

Information Enrichment for Incidents and Threats

Security analysts can benefit by using RiskSense commands to debug and respond to incidents and threats. For example, analysts can look up host details for the host that shows up in a alert and quickly gauge the risk that host presents based on its risk score and vulnerabilities that exist on the host.

RiskSense Commands on Cortex XSOAR

Command Description
risksense-get-hosts Get all hosts info from RiskSense
risksense-get-apps Get information about an application
risksense-get-host-detail Get host information in detail for a particular host with finding distribution count and RS3 info
risksense-get-app-detail Get application information in detail for a particular application with finding distribution count
risksense-get-host-finding-detail Get host finding information with detail projection for particular host finding ID
risksense-get-open-host-finding Get basic information of open host finding based on various filter like hostname,
criticality, severity etc. Return total number of open findings on a particular host broken down as CHMLI
risksense-get-closed-host-finding Get basic information of close host finding based on various filter like hostname,
criticality, severity etc. Return total number of closed findings on a particular host broken down as CHMLI
risksense-get-unique-cves Returns all CVE exposure on a host based on its findings

Overview

RiskSense provides vulnerability management, assessment, and response to changes in the environment while prioritizing risk across vulnerabilities, configurations, and controls.

Our objective is to integrate with Cortex XSIAM and address use-cases such as:

Aggregation - make RiskSense a source for data ingestion especially as a threat intelligence source in context of a customer’s infrastructure.

Enrichment - be able to enrich security and threat centric data for an incident or during data collection and processing.

Orchestration and Automation - provide functions and capabilities to allow for RiskSense data to be used in creating playbooks for vulnerability management either as a standalone data source or in conjunction with other software and solutions.

Use-Cases

Automated Vulnerability Enrichment and Context Addition

With the Cortex XSIAM-RiskSense integration, security orchestration playbooks can benefit from ingesting and enriching host vulnerability information along with other custom fields such as a host risk score and vulnerability risk rating to help security operations prioritize and remediate vulnerabilities. RiskSense integration can provide all necessary data to security analyst to help make their decision based on actual risk.

Information Enrichment for Incidents and Threats

Security analysts can benefit by using RiskSense commands to debug and respond to incidents and threats. For example, analysts can look up host details for the host that shows up in a alert and quickly gauge the risk that host presents based on its risk score and vulnerabilities that exist on the host.

RiskSense Commands on Cortex XSIAM

Command Description
risksense-get-hosts Get all hosts info from RiskSense
risksense-get-apps Get information about an application
risksense-get-host-detail Get host information in detail for a particular host with finding distribution count and RS3 info
risksense-get-app-detail Get application information in detail for a particular application with finding distribution count
risksense-get-host-finding-detail Get host finding information with detail projection for particular host finding ID
risksense-get-open-host-finding Get basic information of open host finding based on various filter like hostname,
criticality, severity etc. Return total number of open findings on a particular host broken down as CHMLI
risksense-get-closed-host-finding Get basic information of close host finding based on various filter like hostname,
criticality, severity etc. Return total number of closed findings on a particular host broken down as CHMLI
risksense-get-unique-cves Returns all CVE exposure on a host based on its findings

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedJuly 22, 2020
Last ReleaseMay 7, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.