Vulnerability Management

  • Updated

The Vulnerability Management page provides a centralized list of vulnerabilities identified across your AI systems. It enables teams to track known issues, assess their severity, and take appropriate actions to mitigate or resolve them.

Purpose

This page serves as the starting point for identifying and triaging vulnerabilities. Each entry represents a documented issue that may pose a threat to the integrity, safety, or reliability of an AI system.

While this view offers a high-level summary, the core functionality lies in selecting an individual vulnerability for deeper management.

Core Action: Click Into a Vulnerability

The most important action on this page is clicking on a vulnerability row. Doing so opens the Vulnerability Details Page, where you can:

  • View full metadata, including descriptions, severity, and dates

  • Review associated AI systems and datasets

  • Manage the approval or escalation process

  • Add comments and documentation

  • Track and update mitigation plans

This deeper view is where key decisions are made and progress is tracked.

Overview of Table Features

  • Summary Table – Shows each vulnerability’s:

    • Title

    • Status (e.g., Open, In Review, Resolved)

    • Risk level (e.g., High, Medium, Low)

    • Category

    • Assigned owner

    • Edit option

  • Filters – Narrow results by risk level, category, owner, or resolution status.

  • Add New Vulnerabilities

    • New Vulnerability – Manually create a single entry. See: Create a New Vulnerability

    • Bulk Upload – Upload multiple entries at once using a provided CSV template.

  • Access Summary Dashboards – Use the dashboard tab to open the Vulnerability Management Dashboard, which offers visual summaries and trend reporting.

Notes

  • Use this page to monitor all open and historical vulnerabilities in one place.

  • The true value of vulnerability management happens at the individual record level—accessed by clicking into the entry.

  • Every vulnerability is tracked with audit history and can be escalated or approved as needed.

  • Bulk upload helps operationalize vulnerability tracking across large or complex environments.

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request