On This Page
Risk Configuration
SecureTrack comes with a defined set of risks. SecureTrack produces the security score and risk instances in the risk charts and risk browser based on the risks that are selected in the risks configuration.
These risks are divided into these risk types:
- Risky rules - Rules that include services with source and destination that are likely to not be secure
- Weak rules - Rules that are not configured according to basic networking principles or industry best practices
- Weak policies - Policies that are not configured according to basic networking principles or industry best practices
Each risk is defined with a name, severity, description and access, if applicable. You can change the name and definition to fit the terminology and structure of your organization. You can also change the severity to indicate how important the risk is to your organization.
How Do I Get Here?
In SecureTrack, go to: