Management Interface Page: Security

Description

This page displays various cybersecurity-related indicators based on the realtime observation of the system. More than a static analysis or an offline reporting as it should be, the system has the ability to run an auto-diagnostic and display the information as it is currently deployed on the system.

Screenshot

Attack surface rating

The top section of the page regroups 4 essential indicators to evaluate the potential attack surface of your system. It provides a global rating from A (best) to G (worst). The attack surface refers to all the points where an unauthorized user could interact with or exploit the system. It is an evaluation based on the complexity of the system derived from several key factors. While this rating is critical for assessing risk in regard to EU NIS2 directive or ISO 27001 standard, it should not be seen as a guarantee of security, as other factors can also influence the overall resilience of the system.

Note that a the rating itself does not mean your system is at risk nor safe, it is a reference point that can be used to evaluate your security posture and assess the impacts of updates and new deployments.

Screenshot

Software Bill of Materials

The bottom part of the page is a fully detailed software bill of materials of the system and is detailed per plugin.

A Software Bill of Materials (SBOM) is a detailed, structured list of all components, libraries, dependencies, and other elements used in building a software application. It provides transparency into the software’s supply chain, helping organizations identify vulnerabilities, manage licenses, and ensure the integrity of the code by tracking the origin and version of each component.

A SBOM is essential to define a Vulnerability Exploitability eXchange (VEX) which is a form of security advisory that indicates whether a product or products are affected by a known vulnerability or vulnerabilities.

Each plugin archive is listed with its last modification date, total binary size and computed checksum in blue color. This helps tracking any tempering or alterations to the codebase.

Additional details include:

Screenshot