Creating and triggering vulnerability assessment scan

Use the Vulnerability Management component of IBM Data Risk Manager to create and run the assessment scan in IBM Security Guardium to identify vulnerabilities in databases.

Before you begin

Ensure that IBM Data Risk Manager is integrated with IBM Security Guardium. For more information about integration, see Integrating IBM Security Guardium with IBM Data Risk Manager.

Procedure

  1. Log on to IBM Data Risk Manager Application Suite (https://<IDRM-Server-IP-Address>:8443/albatross/a3suite).
  2. Click the application menu icon Application navigation icon.
  3. Click Vulnerability Management.
  4. Select a program from the list.
  5. Click Create New Assessment.
  6. On the Create New Assessment page, set the following options and click Create Assessment.
    Option Description
    Assessment Name IBM Security Guardium vulnerability assessment name.
    Scan Type Scan type, for example, Database Scanner.
    Platform Database type selection for running the vulnerability assessment process.
    Run on IBM Security Guardium adapter instance for running the vulnerability assessment process.

    List contains only the instances for which option Run VA is selected when the integration instance is created.

  7. Under Scope of Assessment, add data sources to the transaction based on the scope or last scan days. You can add multiple data sources.
  8. Click Add Scope to Transaction.
  9. Select vulnerability tests from the list and click Save.
  10. Under Pending Transactions on the Transaction View, click the Start Process icon Start process icon.
  11. Select Scan Now.

    To schedule the scan later, select Scan Later.

    To save transaction details after completion of the process under Pending Transactions for reuse, select Replica.

  12. To start the process, click the Trigger Assessment icon Trigger assessment icon.