Page tree
Skip to end of metadata
Go to start of metadata

Security Assessment


Risk Probability Impact
4.8 2.2 2.5

CSVV Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N




Vulnerability Information


Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.




Table of Contents


Contribute


You are facing an issue that is not covered in our guides, we are happy to include solutions here. Please send us an e-mail to support@crashtest-security.com.



Crashtest Security


Crashtest Security is a Munich, Germany based start-up that redefines web application vulnerability scans.  The Crashtest Security Suite is differentiating itself as a fully automated vulnerability scanner enhanced with artificial intelligence developed for the needs of the agile developer or SecDevOps. Clear vulnerability insights are provided as well as contextual actionable insights for risk mitigation. 




  • No labels