Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error
Server Error

Risk Management

Learn how to implement Asset, Third Party and Business Risk Management in eramba. Given the large number of relationships that Risks have with other modules, this course is probably the longest in our entire curricula.

  • Episodes11
  • Duration47m 21s
  • LanguagesEN
Episode 10

Threats & Vulnerabilities

How a database of known vulnerabilities and threats can be used

Introduction

Each risk you create requires you to describe what Threats and Vulnerabilities exist around them, you can do this using Tags or a text field. All these fields are optional, so using Customizations you could if you want remove them from the form.

Tags come from eramba database, you can control what tags exist using the "Settings" > "Threats" / "Vulnerabilities" settings. Under this menu you can Add, Edit and Delete tags.

Automatic Suggestion

When Risk link to Assets eramba will suggest Threat and Vulnerabilities automatically based on the "Type" of asset (Software, Data Asset, Etc). These suggestions might not always be accurate and therefore you will have to adjust them. The database that links Threats, Vulnerabilities and their associated Asset Types does not have a user interface.