diff --git a/vanta/assets/logs/vanta_tests.yaml b/vanta/assets/logs/vanta_tests.yaml index bf797dfd8e1c4..6b161fdab10d9 100644 --- a/vanta/assets/logs/vanta_tests.yaml +++ b/vanta/assets/logs/vanta_tests.yaml @@ -1,6 +1,169 @@ -id: vanta +id: "vanta" tests: - - sample: '{ "vulnerability_info": { "id": "671238azxf205f2660bfa438", "name": "CVE-2019-2699", "description": "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.", "integrationId": "microsoft_365_defender", "packageIdentifier": "jre:8.0.2020.8", "vulnerabilityType": "COMMON", "targetId": "67123809af3911111135aa26", "firstDetectedDate": "2024-10-18T10:27:45.642Z", "sourceDetectedDate": null, "lastDetectedDate": null, "severity": "CRITICAL", "cvssSeverityScore": 9, "scannerScore": null, "isFixable": true, "remediateByDate": "2024-10-22T08:14:27.181Z", "relatedVulns": [], "relatedUrls": [], "externalURL": "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", "scanSource": "Not provided", "deactivateMetadata": { "deactivatedBy": "671220f0d70mbve18c0ebca8", "deactivatedOnDate": "2024-10-23T10:26:42.880Z", "deactivationReason": "test", "deactivatedUntilDate": null, "isVulnDeactivatedIndefinitely": true } }, "asset_info": { "id": "67123809af3911111135aa26", "name": "clw238-test: Windows11", "assetType": "WORKSTATION", "hasBeenScanned": true } }' - result: null - - sample: '{ "vulnerability_info": { "id": "671238plof205f2660bf7f87", "name": "CVE-2023-42950", "description": "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.", "integrationId": "microsoft_365_defender", "packageIdentifier": "jre:8.0.2020.8", "vulnerabilityType": "COMMON", "targetId": "67123809af3911111135aa26", "firstDetectedDate": "2024-10-18T10:27:44.738Z", "sourceDetectedDate": null, "lastDetectedDate": null, "severity": "HIGH", "cvssSeverityScore": 8.8, "scannerScore": null, "isFixable": true, "remediateByDate": "2024-10-22T08:20:08.076Z", "relatedVulns": [], "relatedUrls": [], "externalURL": "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", "scanSource": "Not provided", "deactivateMetadata": null }, "asset_info": { "id": "67123809af3911111135aa26", "name": "clw238-test: Windows11", "assetType": "WORKSTATION", "hasBeenScanned": true } }' - result: null + - + sample: |- + { + "asset_info" : { + "hasBeenScanned" : true, + "name" : "clw238-test: Windows11", + "id" : "67123809af3911111135aa26", + "assetType" : "WORKSTATION" + }, + "vulnerability_info" : { + "severity" : "CRITICAL", + "externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", + "targetId" : "67123809af3911111135aa26", + "isFixable" : true, + "remediateByDate" : "2024-10-22T08:14:27.181Z", + "description" : "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.", + "integrationId" : "microsoft_365_defender", + "firstDetectedDate" : "2024-10-18T10:27:45.642Z", + "scanSource" : "Not provided", + "cvssSeverityScore" : 9, + "deactivateMetadata" : { + "deactivationReason" : "test", + "deactivatedOnDate" : "2024-10-23T10:26:42.880Z", + "isVulnDeactivatedIndefinitely" : true, + "deactivatedBy" : "671220f0d70mbve18c0ebca8" + }, + "name" : "CVE-2019-2699", + "packageIdentifier" : "jre:8.0.2020.8", + "id" : "671238azxf205f2660bfa438", + "vulnerabilityType" : "COMMON" + } + } + result: + custom: + asset_info: + assetType: "WORKSTATION" + hasBeenScanned: true + id: "67123809af3911111135aa26" + name: "clw238-test: Windows11" + vulnerability_info: + cvssSeverityScore: 9 + deactivateMetadata: + deactivatedBy: "671220f0d70mbve18c0ebca8" + deactivatedOnDate: "2024-10-23T10:26:42.880Z" + deactivationReason: "test" + isVulnDeactivatedIndefinitely: true + description: "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system." + externalURL: "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities" + firstDetectedDate: "2024-10-18T10:27:45.642Z" + id: "671238azxf205f2660bfa438" + integrationId: "microsoft_365_defender" + isFixable: true + name: "CVE-2019-2699" + packageIdentifier: "jre:8.0.2020.8" + remediateByDate: "2024-10-22T08:14:27.181Z" + scanSource: "Not provided" + severity: "CRITICAL" + targetId: "67123809af3911111135aa26" + vulnerabilityType: "COMMON" + message: |- + { + "asset_info" : { + "hasBeenScanned" : true, + "name" : "clw238-test: Windows11", + "id" : "67123809af3911111135aa26", + "assetType" : "WORKSTATION" + }, + "vulnerability_info" : { + "severity" : "CRITICAL", + "externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", + "targetId" : "67123809af3911111135aa26", + "isFixable" : true, + "remediateByDate" : "2024-10-22T08:14:27.181Z", + "description" : "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.", + "integrationId" : "microsoft_365_defender", + "firstDetectedDate" : "2024-10-18T10:27:45.642Z", + "scanSource" : "Not provided", + "cvssSeverityScore" : 9, + "deactivateMetadata" : { + "deactivationReason" : "test", + "deactivatedOnDate" : "2024-10-23T10:26:42.880Z", + "isVulnDeactivatedIndefinitely" : true, + "deactivatedBy" : "671220f0d70mbve18c0ebca8" + }, + "name" : "CVE-2019-2699", + "packageIdentifier" : "jre:8.0.2020.8", + "id" : "671238azxf205f2660bfa438", + "vulnerabilityType" : "COMMON" + } + } + tags: + - "source:LOGS_SOURCE" + - + sample: |- + { + "asset_info" : { + "hasBeenScanned" : true, + "name" : "clw238-test: Windows11", + "id" : "67123809af3911111135aa26", + "assetType" : "WORKSTATION" + }, + "vulnerability_info" : { + "severity" : "HIGH", + "externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", + "targetId" : "67123809af3911111135aa26", + "isFixable" : true, + "remediateByDate" : "2024-10-22T08:20:08.076Z", + "description" : "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.", + "integrationId" : "microsoft_365_defender", + "firstDetectedDate" : "2024-10-18T10:27:44.738Z", + "scanSource" : "Not provided", + "cvssSeverityScore" : 8.8, + "name" : "CVE-2023-42950", + "packageIdentifier" : "jre:8.0.2020.8", + "id" : "671238plof205f2660bf7f87", + "vulnerabilityType" : "COMMON" + } + } + result: + custom: + asset_info: + assetType: "WORKSTATION" + hasBeenScanned: true + id: "67123809af3911111135aa26" + name: "clw238-test: Windows11" + vulnerability_info: + cvssSeverityScore: 8.8 + description: "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems." + externalURL: "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities" + firstDetectedDate: "2024-10-18T10:27:44.738Z" + id: "671238plof205f2660bf7f87" + integrationId: "microsoft_365_defender" + isFixable: true + name: "CVE-2023-42950" + packageIdentifier: "jre:8.0.2020.8" + remediateByDate: "2024-10-22T08:20:08.076Z" + scanSource: "Not provided" + severity: "HIGH" + targetId: "67123809af3911111135aa26" + vulnerabilityType: "COMMON" + message: |- + { + "asset_info" : { + "hasBeenScanned" : true, + "name" : "clw238-test: Windows11", + "id" : "67123809af3911111135aa26", + "assetType" : "WORKSTATION" + }, + "vulnerability_info" : { + "severity" : "HIGH", + "externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", + "targetId" : "67123809af3911111135aa26", + "isFixable" : true, + "remediateByDate" : "2024-10-22T08:20:08.076Z", + "description" : "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.", + "integrationId" : "microsoft_365_defender", + "firstDetectedDate" : "2024-10-18T10:27:44.738Z", + "scanSource" : "Not provided", + "cvssSeverityScore" : 8.8, + "name" : "CVE-2023-42950", + "packageIdentifier" : "jre:8.0.2020.8", + "id" : "671238plof205f2660bf7f87", + "vulnerabilityType" : "COMMON" + } + } + tags: + - "source:LOGS_SOURCE" \ No newline at end of file diff --git a/vanta/metadata.csv b/vanta/metadata.csv index ef1640e1942fd..8d6c632b24a40 100644 --- a/vanta/metadata.csv +++ b/vanta/metadata.csv @@ -4,5 +4,5 @@ vanta.frameworks.controls_total,gauge,,,,Total number of controls in the framewo vanta.frameworks.count,gauge,,,,Total number of frameworks,0,vanta,Total Frameworks,, vanta.frameworks.documents_passing,gauge,,,,Number of passing documents in the framework,1,vanta,Passing Documents,, vanta.frameworks.documents_total,gauge,,,,Total number of documents in the framework,0,vanta,Total Documents,, -vanta.frameworks.tests_passing,gauge,,,,Number of passing tests in the framework,1,vanta,Passing Tests, +vanta.frameworks.tests_passing,gauge,,,,Number of passing tests in the framework,1,vanta,Passing Tests,, vanta.frameworks.tests_total,gauge,,,,Total number of tests in the framework,0,vanta,Total Tests,,