• Log inStart now

Manage vulnerabilities as a security team

This document covers how to:

  • Calculate the vulnerability surface area of our software systems
  • Understand how runtime architecture of each application affects business risk, vulnerability and severity
  • Assign security tasks to individual developers

If this workflow doesn't sound like you, check out our document on managing vulnerabilities as a developer.

Prerequisites

Vulnerability data sent through one of our integrations.

View the vulnerability surface area of your systems

Once vulnerability data starts flowing into New Relic, you can access your data through various scoped views. To view a summary of your entire system navigate to the vulnerability management summary page. This page provides curated dashboards representing the vulnerability of your system and baseline security hygiene.

Dig deeper into the security of your system by auditing the vulnerability of all your entities, libraries, and active vulnerabilities:

Copyright © 2022 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.