featured
May 3, 2022
April 12, 2022
Vulnerability Prioritisation

How to create prioritisation rules in RankedRight

With RankedRight you can go from an unmanageable and disparate view of your risk to a specific, operational plan of what needs to be done in minutes. It all comes down to your rules.

~ 0 min read

Overwhelmed by the high volumes of vulnerability data your scans are producing? With RankedRight you can go from an unmanageable and disparate view of your risk to a specific, operational plan of what needs to be done in minutes. It all comes down to the prioritisation rules you set and this article will guide you through the process.

On the RankedRight platform, you can import data from all the leading scanners in whatever frequency or volume you require. Some of our clients use multiple scanners and have thousands of devices which result in tens of thousands of vulnerabilities but the RankedRight system makes them manageable to sort through.

Once you’ve imported your data, all of your vulnerabilities will be displayed.

How scan data is displayed after being imported to the platform

The RankedRight platform automatically filters out vulnerabilities with a CVSS of 0. By removing these findings by default, your list has already reduced significantly, in some cases by thousands of vulnerabilities, but if you’d prefer to keep these in, simply use the toggle feature at the top of the page.

RankedRight also has a built-in rule to filter for exploitable vulnerabilities. With every new scan you conduct, our platform enriches your data with the most up-to-date vulnerability intelligence that we’ve collected from our partners and other sources. This allows us to pick out the vulnerabilities on your list that we know are exploitable, and understand how prolific each one is by how many public exploits are available for it.

As new exploits are discovered, we will update your data accordingly so that you always have a live view of the risks facing your business and can manage what is most critical to you as effectively as possible.

Scan data after RankedRight's built-in rule has been applied

Now that the platform has taken you this far, you have full control to set additional rules as you please. This is where the real power of RankedRight comes in.

You can use the platform to segregate by

  • Environment
  • Technology
  • Criticality of assets
  • MITRE ATT&CK tactics
  • Whether or not there’s an exploit available
  • Whether a vulnerability is weaponised
  • Ease of exploitation
  • CIA impact
  • and much more

It’s easy to create rules for your entire estate or for specific environments and users. You can even create buckets which combine multiple rules to automate the sorting process even further. We’ve been delighted by the way our customers have been using the platform, creating rules we hadn’t even envisaged. The control really is all yours.

Some of the rules you can set within the RankedRight platform

Once you have set your rules, every vulnerability will be automatically prioritised accordingly. This of course may still present you with a long list of tasks to complete which is where the great feature of assigning rules to users really helps. You have a team of skilled individuals beside you – get them working on the right vulnerabilities as quickly as possible.

While working through their lists, they can take decisions, with the help of our intel, on how to respond to each vulnerability: accept; defer; remediate. All actions are logged and displayed on an audit trail within each individual vulnerability record so that if it resurfaces further down the line, you can quickly see which actions have been taken so you can either repeat them or figure out why the vulnerabilities has returned.

It really is that simple. Prioritise what is important to your business now. Save your team hours with every new scan and get to remediation faster.

Triage Library Screenshot
The RankedRight Platform

Book a demo

Learn about RankedRight and ask questions with a 45 minute call.

Other articles

Latest news within the cyber security space and some useful guides, links and other resources