Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

Overview

The Risk Report is a management-level tool that provides a bird's-eye view of all aspects of an account's open-source libraries with regard to security, quality and compliance.

Accessing the Report

  1. From the main menu, select Reports > Risk. The Risk Report page is displayed.

  2. Define the scope for which the report should be created. The default scope is Organizational; however you can select any individual product and/or project for your data scope from the dropdown menus next to the report name, as follows:

    1. Open the All Products dropdown menu and select the product on which you want to base the report. 

    2. If you want to base the report on specific projects, open the All Projects dropdown menu and select one or multiple projects in the selected product.

    3. Click Apply and wait for the data to load into the report.

...

Understanding the Report Data

The Open Source Risk Report comprises a number of panels and tables displaying risk-related information, as described in the following sections.

How Do We Compare?

NOTE: This section appears only at organizational level.

This section displays how selected measurements of your organization's risk and compliance levels compare to overall average statistics calculated for Mend customers. It includes the following three charts:

  • Vulnerable Libraries: The percentage of vulnerable libraries in your organization compared to the overall average calculated for Mend customers.

  • Policy Violating Libraries: The percentage of policy-violating libraries in your organization compared to the overall average calculated for Mend customers.

  • Outdated Libraries: The percentage of outdated libraries in your organization compared to the overall average calculated for Mend customers.

...

Security

NOTE: For customers with Vulnerability-based Alerting enabled, some of the headings in the Security panel were changed. See Vulnerability-Based Alerts.

This panel displays a high-level graphic analysis of the health of your software, at organizational level or product level views. This includes the vulnerability score (base on the highest severity vulnerability), number of vulnerable components out of total components, severity distribution, aging security vulnerabilities, license risk distribution, outdated components out of total components and libraries with multiple versions.

...

Panel

...

Description

...

Vulnerability Score

...

Displays the highest severity in the scope (Organization, Product or Project)

...

Vulnerable Libraries

...

The following statistics can be displayed about Vulnerable libraries:

  • No Known Vulnerabilities: Counts the total number of libraries that don't have any security vulnerabilities

  • Vulnerable: Counts the total number of unique libraries with at least one active security vulnerability

  • Outdated: Counts the total number of unique libraries with at least one active security vulnerability and that are outdated (new version alert)

...

Severity Distribution

...

Counts the distribution of the highest severity vulnerability of all libraries. If a library has high, medium and low vulnerabilities, it is counted as 1 High.

...

Aging Security Vulnerabilities

...

Counts the vulnerabilities according to the Vulnerability-based Alerts data model. See also Security Alerts: View by Vulnerability.

License Risks and Compliance

This panel provides an overview of the License Distribution of the organization (or product), showing which licenses are used and how many libraries are associated with each license.

This panel also shows the License Risk Distribution, indicating the number of policy-violating libraries, and how many libraries are associated with each license (see Risk Score Rating). The Other bar refers to libraries with unspecified licenses, or licenses that have yet to be rated.

...

Quality

This panel to the right of License Risks and Compliance provides information about any outdated libraries.

...

Additional Risk Information

The remainder of the Risk report contains detailed tables with various component-level breakdowns.

NOTE: In the detailed tables, by clicking on any of the field names you can sort the table in ascending order. Clicking the field name again will sort in descending order.

General Overview Table

This table provides an overview of Libraries, Licenses, Security & Quality per product.

...

Security Vulnerabilities Table (Security)

This table provides a detailed list of Security Vulnerabilities per component. For each Vulnerability, the associated Library, Description and Top Fix are displayed.

...

Outdated Libraries Table (Security)

This table provides details of Outdated Libraries per product or project, their current Versions, and the recommended action to be taken for each outdated library (usually to update to the latest version).

...

Use of Different Versions of the Same Library (Security)

This table provides details of libraries for which different versions are included in the code base. It displays only multi-version usage within the same product, not multi-version libraries throughout the organization (i.e., using different versions of a library in two separate deliverable products does not count as multi-version usage).

...

Policy Violations (Compliance)

This table provides details of libraries that violate organizational or product policies per project, along with the date of violation and recommended actions.

...

High-Risk Licenses (Compliance)

This table provides details of libraries that are associated with high-risk licenses, along with indications on the risk nature and score, as well as recommended actions.

...

Exporting the Report

You can export the Risk report as a PDF file, to be shared within the organization. To do this:

  • Click Export to PDF at the top right of the report.

The exported report will reflect the selected report scope (organizational, product or project) and specified filters.This page is available at: https://docs.mend.io/bundle/sca_user_guide/page/the_risk_report.html