Kaspersky Anti Targeted Attack Platform

Monitoring risks

Kaspersky Anti Targeted Attack Platform can detect risks to which the information system resources are exposed. The application identifies the risks based on traffic analysis results and the received device information.

Detected risks can belong to the following categories:

  • Vulnerability. Detected device vulnerabilities belong to this category.
  • Configuration problems. This category includes security risks caused by incorrect configuration and risks of compromising data when writing and reading device configurations.
  • Insecure network architecture. This category includes risks associated with detected insecure network interactions, devices, protocols, and software; risks due to authorized devices becoming inactive; and risks due to the EPP applications being absent from devices or not fully functional.

Each risk is scored from 0.0 to 10.0. When calculating the risk score, the application takes into account the available information about the device with which the detected risk is associated. When calculating the score, the application takes into account the importance level of the device, as well as other risks associated with that device. The base score is used as the initial value for the calculation. The base scores of risks in the Vulnerability category follow the Common Vulnerability Scoring System (CVSS). For the rest of the risk categories, the base scores are taken from the table of risk types.

Risk information is uploaded to the database of detected risks on the Central Node. The total amount of stored records in the database cannot exceed the specified limit. If the amount exceeds the limit, the application automatically deletes 10% of the oldest records. You can set the maximum size of detected risk information when configuring the storage settings.

The contents of the detected risk database is displayed in the Risks section of the application web interface. You can also view an overview of device risks in the Assets section on the Devices tab.

In this section

About risks of the Vulnerability category

Implementation scenario for a continuous risk management process

Viewing the table of risks

Viewing risk information

Manually changing risk status

Viewing risk information while managing the table of devices