This page includes details to monitor the vulnerability risk of a Business Transaction. A business transaction is a path a request takes within an application to deliver the service it promises.

Cisco Secure Application maps security vulnerability events to applications, tiers, and nodes. To get more specific information about the business risk of the events, Cisco Secure Application correlates vulnerabilities to business transactions. This enables you to prioritize what is required to triage, mitigate and remediate, which reduces risk exposure to the business.

You can use the Search filter for the Business Transaction, Application, and Entry Tier categories. For more information about the Search filter, see View Data Using Search Filter in Monitor Application Security Using Cisco Secure Application.

The Business Transactions page includes these details:

Field NameDescription
Business Transaction

The name of the business transaction.

To view the business transaction on the AppDynamics Controller, click the icon next to the name.

Application (Tiers)

The application name and the number of tiers that are part of the business transaction for the application.

To view the application on the AppDynamics Controller, click the icon next to the name.

Entry Tier

The tier from which the transaction originates.

To view the tier on the AppDynamics Controller, click the icon next to the name.

RiskThe risk score. The higher the value, the higher the risk for the application vulnerability.
Vulnerabilities

The number of vulnerabilities detected is based on their severity. 

  • Critical
  • High 
  • Medium
  • Low

The color-coded icons represent these severities.

You can click Export to download all the table data. It downloads all the rows, columns, and related data in a .csv file. The filter data is available in a separate .json file. Also, the files are downloaded in .zip format.

View Business Transaction Details

To view details for a specific business transaction, click any business transaction on the Business Transactions page.

The top pane is split into the left (a business transaction summary) and the right (tier with the highest risks).

TIER WITH HIGHEST RISKS displays up to five tiers with the highest security risk. The tiers displayed are in the order of the most severe vulnerabilities that affect the risk of the business transaction.

Selecting either a severity or a tier in the top pane automatically creates a filter for the vulnerabilities details mentioned in the bottom pane.

The bottom pane displays the vulnerabilities found in the selected business transaction.

Field NameDescription
Severity

The severity of the vulnerability.

Reached

A yellow icon is displayed in this column to indicate that a vulnerability method is matched.

RiskThe risk score of the vulnerability. This helps in prioritizing the affected services. A higher risk score indicates that the corresponding library on the related service is at a higher risk.
TitleThe vulnerability type involved in the business transaction. 
ID

The Common Vulnerabilities and Exposure (CVE) identifier. You can click the name to view the details specific to that CVE. 

Tier (Nodes)

The services or the tiers that are affected because of the selected vulnerability. The number indicates the number of affected nodes.
The tier icon directs to the AppDynamics flow map for that tier.

LibraryThe library affected because of the vulnerability. You can click the library to view the details of the library. See Monitor Libraries.
Last DetectedThe time duration since the vulnerability was last seen on the tier.
Status

The status of the selected vulnerability. The status value can be:

  • Discovered (at least one vulnerability is discovered in the library)
  • Confirmed (manually set by user after review)
  • Fixed (vulnerability is fixed)
  • Ignored (manually set by user after review)
  • Not Vulnerable (no vulnerabilities are found in the library)

The Discovered and Fixed statuses are automatically detected based on the libraries used in the application. 

You can click Export to download all the table data. It downloads all the rows, columns, and related data in a .csv file. The filter data is available in a separate .json file. Also, the files are downloaded in .zip format.