Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In most use-cases, when vulnerability data is imported into Prism, the data contains the sufficient asset attribution of a vulnerability meaning Prism will compile and maintain information is contained in the vulnerability data enabling Prism to compile an asset database that contain with the asset information taken from vulnerability scanning datadata. As new scan data comes into Prism, the asset database is updated. New host information identified in scan results are added as new assets where necessary.

There may be circumstances where assets need to be imported to Prism outside of vulnerability data. This import feature enables both new assets to be created and existing assets to be enriched with meta data such as system ownership, technical ownership, priority rating, or asset value.

...