Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

Overview

When Mend Prioritize (Effective Usage Analysis) is enabled, various screens, components, and reports in the Mend application are enhanced with additional information about security vulnerabilities.
This page describes this functionality.

Info

For customers with Security Alerts: View By Vulnerability enabled, note that grey shields will not be displayed, as they indicate libraries, not vulnerabilities.

Home, Product and Project Screens

With Mend Prioritize, the Home, Product and Project main screens display vulnerabilities effectiveness-related information in the Vulnerability Analysis pane.

In addition, Security vulnerability displays (e.g., Home screen, Security Vulnerabilities screen) feature effectiveness indicators ('shields') for components analyzed with Mend Prioritize. For more information regarding the Vulnerability Analysis Pane, click here.

Mend Prioritize Indicators

Prioritize Effectiveness Indicators

...

Effectiveness Indicator

...

Red Shield

...

Yellow Shield

...

Green Shield

...

Grey Shield

No shield

...

The security vulnerability was confirmed by Effective Usage Analysis to have at least one reference from proprietary code (directly or indirectly)

...

  • The security vulnerability could not be confirmed by Effective Usage Analysis to have – or not have – effective references from proprietary code (e.g., due to unavailable data in the knowledge base). For practical purposes – they should be deemed effective.

...

The security vulnerability was confirmed by Effective Usage Analysis to have no effective references from proprietary code

...

[N/A – this view does not feature the grey shield]

...

  • The security vulnerability was not analyzed with Prioritize– either because the pertinent project was not analyzed, or because the vulnerability was discovered only after the project was analyzed by Effective Usage Analysis

  • The analysis process was not completed successfully due to a missing or corrupt file encountered during analysis

...

At least one of the security vulnerabilities reported for the component was confirmed by Effective Usage Analysis to have at least one reference from proprietary code (directly or indirectly)

...

  • At least one of the security vulnerabilities reported for the component was marked with a yellow shield

  • None of the component's reported vulnerabilities was marked with a red shield

...

Each of the security vulnerabilities reported for the component was marked with a green shield

...

Vulnerability related information changed for the pertinent library after the library was analyzed by Effective Usage Analysis (e.g., a new vulnerability was reported)

...

The library was not analyzed with Prioritize.

  • The analysis process was not completed successfully due to a missing or corrupt file encountered during analysis

...

For a component listed in the Top Alerts table under Product or Organization

...

At least one of the underlying Project-level alerts for the library was marked by analysis with a red shield

...

At least one of the underlying Project-level alerts for the library was marked by analysis with a yellow shield and none with a red shield

...

All underlying Project level alerts for the library were marked by analysis with a green shield

...

At least one of the underlying Project-level alerts for the library was marked by analysis with a grey shield, and none with a red or yellow shield

...

At least one of the underlying Project level alerts for the library is featured by a Project that was not analyzed with Prioritize and analyzed Projects are not marked with a red, yellow or grey shield

...

General

...

A red shield denotes an ‘effective’ finding

...

A yellow shield denotes a ‘suspected’ finding

...

A green shield denotes an ‘ineffective’ finding

...

A grey shield denotes an ‘outdated’ status finding

...

A ‘blank’ shield (i.e., no shield) denotes an element that was not analyzed

Prioritize Severity Indicators

Security Vulnerability views feature enhanced severity details for components analyzed with Mend Prioritize. This is displayed in a number provided in parentheses (x) next to the existing severity provided for a given vulnerability severity class (e.g., High, Medium, Low) like in the following screenshot:

...

  • Severity: x (0): Effective Usage Analysis confirmed that the analyzed proprietary code scope (e.g., Project) has 0 references to all (x)  vulnerabilities reported for the open-source component (i.e., green shield).

  • Severity: x (y) [note: 0<y<=x]: Effective Usage Analysis found that the analyzed proprietary code scope has references to some or all (y) of the vulnerabilities (x) reported for the open-source component (i.e., red shield).

  • Severity: x (x): Effective Usage Analysis found that the analyzed proprietary code scope has references to all vulnerabilities (x)  reported for the open-source component (i.e., red shield)

  • Severity: x (z?): Effective Usage Analysis found that the analyzed proprietary code scope has references to some (z) of the reported vulnerabilities (x), but could not fully establish whether there are references to some of the security vulnerabilities reported for the open-source component (i.e., red shield).

  • Severity: x (z…?): Effective Usage Analysis found that the analyzed proprietary code scope has references to some (z) of the reported vulnerabilities (x), and while it could not fully establish references to some of the security vulnerabilities reported for the open-source component (i.e., red shield) class-level call traces were found.

Mend Prioritize Details in the Vulnerability Analysis Pane

With Mend Prioritize, the Vulnerability Pane charts depict Mend Prioritize results. The charts visualize the distribution of analysis results and enable users to establish how many of the reported vulnerabilities were confirmed by Mend Prioritize to be effectively referenced from proprietary code.

...

  • Reported Vulnerability: the distribution of libraries based on their highest vulnerability severity. Consequently, a library that has multiple severities will only be counted once – and for its highest severity

  • Library Statistics: the number of vulnerable libraries that are outdated, vulnerable, or both

    • Vulnerable Libraries - the distribution of libraries based on their highest vulnerability severity.

    • Outdated Libraries – the number of libraries that are outdated.

  • Severity-based View - Vulnerability Effectiveness: the distribution of security alerts marked with a red, yellow, grey or green shield, accounting for reported vulnerability severity. The vulnerabilities with a reported severity are marked using the same colors denoting the severity on the Reported Library Vulnerability chart.

  • Effectiveness-based View - Vulnerability Effectiveness: the distribution of security alerts marked with a red, yellow, grey or green shield.

  • Analysis coverage: the % of analyzed libraries (excluding libraries marked with a grey shield) from the total count of libraries that can be analyzed. The analysis coverage represents the extent Effective Usage Analysis was applied in a given scope (Organization, Product or Project). The coverage is calculated based on the following formula A = B/C where:

...

A

...

Calculated Analysis Coverage: the calculated result for analysis coverage in the pertinent scope (Organization, Product or Project)

...

B

...

Number of library-project 'instances' IN SCOPE that were analyzed by Effective Usage Analysis and are current (i.e., not outdated): library-project 'instances' with green, red or yellow shields - but without grey shields

...

C

...

Maximum number of library-project 'instances' in scope that can be analyzed by Effective Usage Analysis: number of all library-project 'instances' in the scope that can be analyzed by Effective Usage Analysis

A library-project instance denotes a case where a given library is featured in each project. If a given library is featured in 3 different projects, this translates into 3 library-project instances.
Another way to see this is that 3 Effective Usage Analysis processes are required to analyze the projects, regardless of the same library being employed.

  • Overall Effective Vulnerability Index: reflects the portion of security alerts that are not marked with a green shield (i.e., alerts marked with red, yellow or grey shields, and alerts not marked with a shield). Note that the value reflects a measure of effective vulnerability regarding all projects – i.e., those supported by Prioritize (e.g., Java) and those that are not. The Overall Effective Vulnerability Index allows users to establish the portion of alerts found to be ‘effective’, i.e., alerts that imply direct OR indirect calls from proprietary code to open source software with reported vulnerabilities; such alerts arguably warrant higher priority over alerts that are ‘non-effective’ (marked with a green shield). The index also serves as a measure of the savings potentially realized by attending highly-prioritized alerts.   

Mend Prioritize – Detailed Analysis Screen

With Mend Prioritize, the system enhances the regular display of information for security vulnerabilities reported for an open-source component with extended, richer detail.

If an open-source component is analyzed with Mend Prioritize, the detailed view of the component's reported security vulnerabilities (accessed by clicking on the associated Details link in the Alerts report) will feature the following areas:

...

Found Reference View - This view lists references found by Mend Prioritize to exist from proprietary code to open source code for a given security vulnerability selected in the Security Vulnerabilities table. Per each reference the following details will be displayed in independent rows: Organization, Product and Project related to the relevant proprietary code, and the identifier and type of the referenced open-source code featuring the reported vulnerability.

...

Traces View - This tabbed view lists call traces pertaining to a reference selected in the Found Reference view next to it. The Traces view lists per each reference two elements at minimum – an Origin (proprietary code whence the call trace originated) and a Target (open source code associated with the reported vulnerability). If the Target is not called directly by the Origin, then additional calls will be featured in the Traces view, as warranted. If multiple traces were found, all traces will be featured in the Traces table and can be reviewed by scrolling the view. The table featured in the Traces view provides for each found trace call the following details: trace number; an arrow denoting the code called by the code in a given trace row; the caller type (APPLICATION - the proprietary code) or EXTENSION (the non-proprietary code)); and the caller identifier along with the file name and code line number. The user can elect to display a graphical view of the call trace by selecting the Trace View tab. The display presents the call trace from the Origin to the Target through a path consisting of any interim steps. The user may expand or collapse the displayed path by clicking on it.

Security Vulnerabilities Table

Security vulnerabilities view with Mend Prioritize – security vulnerabilities table

...

Found References View

The Found References view serves as the 'parent' of the Traces view (see below), with the entries listed by the latter corresponding with a selected entry in the Found References table.

Security vulnerabilities view with Mend Prioritize – Found references table (references found)

...

Traces view

Security vulnerabilities view with Mend Prioritize – Traces table (traces found)

...

Automated Policies

It is possible to use Prioritize shields as match options in automated policies. See also Automated Policies documentation.

...

Adding a policy by Shield type. 

...

Adding a Policy by Security Vulnerability Severity AND Vulnerability Effectiveness. This page is available at: https://docs.mend.io/bundle/sca_user_guide/page/viewing_mend_prioritize_scan_results_via_dashboard.html