Team Report

Modified on Tue, 4 Jun at 8:25 PM

Select Reports in the navigation bar and choose “Team Reports” from the dropdown. 


The Team Reports in CloudDefense provide a comprehensive overview of your team's security posture, helping you identify critical risks, understand trends, and prioritize remediation efforts. This report includes the following sections:


  • Summary Report

  • Top Vulnerabilities Applications

  • Top Vulnerabilities by Scan

  • Percentage of Scans by Language

  • OWASP Top 10

  • OWASP Top 10 Category

  • Secrets

  • SANS Top

  • SANS Top Category

  • Severity Over Time

  • Vulnerabilities by Ageing

  • Top 10 Applications


You can change the team you're viewing by selecting it from the dropdown menu at the top of the screen.




Summary Report


The Summary Report provides a high-level view of your team's security status, showing counts of total applications scannedTeam Admins, and App Users. This summary helps you understand the overall security landscape of your team.




Top Vulnerabilities Applications


The Top Vulnerabilities Applications section displays the distribution of vulnerabilities across CRITICAL, HIGH, MEDIUM, and LOW levels. The total number of vulnerabilities is displayed on the left end of the bar. The image below offers a clear picture of which applications have the most significant security risks.




Top Vulnerabilities by Scan


In the Top Vulnerabilities by Scan section, you can see a bar chart illustrating the distribution of vulnerabilities by scan type. The types include SCA, API, SAST, Container, and DAST, and the total number of scans is shown on the left end of the bar.




Percentage of Scans by Language


The Percentage of Scans by Language section reveals the distribution of programming languages used in your team's applications. It covers various languages and displays a bar chart that helps you understand your application's tech stack.




Knowing which programming languages are used most frequently in your team's applications allows you to tailor your security strategies accordingly.


OWASP Top 10


The OWASP Top 10 section features a pie chart distribution of the most critical security risks, as outlined in the OWASP Top 10. This globally recognized standard helps developers and security teams understand and address the most critical security vulnerabilities.




Understanding the OWASP Top 10 vulnerabilities present in your team's applications helps you follow industry best practices and reduce your risk by prioritizing remediation for these critical issues.


OWASP Top 10 Category


The OWASP Top 10 Category section breaks down the vulnerabilities into individual horizontal bar graphs, each showing the distribution of CRITICAL, HIGH, MEDIUM, and LOW vulnerabilities within the respective categories.




Secrets


The Secrets section presents a pie chart that shows the percentage distribution of different types of secrets detected in your application scans. This includes various tokensaccess IDsAPI keys, and other sensitive information.




Detecting secrets like tokens and API keys in your source code is critical to preventing data breaches. This report helps you identify and remediate exposed secrets quickly.



SANS Top


The SANS Top section features a bar chart that displays the percentage distribution of all SANS counts detected in the application scans. It provides valuable insights into how your team fares against the most dangerous software weaknesses.




By understanding which SANS categories are most prevalent, you can align your development and security practices with the latest recommendations.



SANS Top Category


The SANS Top Category section provides a structure similar to the OWASP Top 10 Category, with horizontal bar graphs displaying the distribution of vulnerabilities across CRITICAL, HIGH, MEDIUM, and LOW levels within each SANS category.




Severity Over Time


The Severity Over Time section shows a timeline of the number of vulnerabilities resolved over time. It features a curve that indicates how many CRITICAL, HIGH, MEDIUM, and LOW vulnerabilities have been resolved, helping you understand the remediation progress.



By analyzing the remediation progress, you can measure the efficiency of your security team and identify potential areas for improvement.


Vulnerabilities by Ageing


The Vulnerabilities by Ageing section displays the age of vulnerabilities since they were first detected, grouped in days. The vertical bars stack CRITICAL, HIGH, MEDIUM, and LOW vulnerabilities, helping you identify aging security risks.



Aging vulnerabilities pose a significant risk to the organization. Understanding their age helps prioritize remediation efforts for the most critical, long-standing issues.


Top 10 Applications


The Top 10 Applications section ranks the top 10 applications based on their total findings. This ranking gives you a quick overview of which applications require immediate attention.




























By addressing the vulnerabilities in these top 10 applications, your team can significantly improve its security posture.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article