Device Security
Risk Assessment
Table of Contents
Expand All
|
Collapse All
Device Security Docs
Risk Assessment
Device Security assesses risk and assigns a risk score for devices, device profiles,
sites, and organizations.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of the following subscriptions:
|
Assessing risk is a continuous process of discovering vulnerabilities and detecting
threats. During this ongoing process, Device Security measures risk and assigns a
score for the amount of risk it observes. Device Security measures risk at
different levels, starting from individual risk factors identified on a device.
Device Security uses risk factors to calculate individual device risk scores, which
then contribute to the profile, category, type, site, and organization risk scores.
Device Security assesses risk based on the following risk categories when
identified on devices:
- Vulnerabilities: Discovered through passive analysis and detections, and through vulnerability scans using integrated third-party vulnerability scanning engines such as Qualys, Rapid7, or Tenable.
- Security Alerts: Real time threat detections and anomalous behavioral detections by using threat signatures.
- Other Risk Factors: Risk factors not associated with CVEs or threat signatures.
- Poor Security Hygiene: Factors that reflect poor security practices in the network, such as using operating systems that are past end-of-support.
- Exposure: Factors related to the exposure of the device, such as external connectivity.
By collecting and modeling data and analyzing these risk categories,
Device Security calculates risk daily. When calculating the risk scores
of device profiles, sites, and organizations, Device Security considers not only
the scores of individual devices within a particular group but also the percent of
risky devices in relation to all devices in the group.
Device Risk
Device Security displays the device risk score for each device in the
Risk column on the Devices page (AssetsDevices). It generates risk scores for devices daily.

On the Device Details page, you can also find a more comprehensive breakdown of a
device’s risk score. At the top, select See Details next to
the device’s risk score under the thumbnail image. This brings up the
Risk Score Details side panel, which displays the factors that contribute
to the device’s risk score.
Device Security uses two main factors to determine the device risk score:
a device’s exposure score and the impact factor of the
device’s criticality. The exposure score captures all risks identified for the
device, while the impact factor enhances the exposure score based on the
device’s asset criticality. You can adjust risks, compensating controls, and
impact factors by customizing risk scores
to fit your organization’s security posture.
Device Security uses a variety of risk factors to calculate the exposure score.
We generate the exposure score based on the following:
- Vulnerabilities: Known vulnerabilities that appear in the Vulnerabilities inventory.
- Security Alerts: Alerts triggered by anomalous behavior, specific traffic patterns, custom-defined alerts, and threats. View all alerts on AlertsSecurity Alerts.
- Other Risk Factors: Poor hygiene and exposure-related factors, such as an unsupported OS or internet exposure.
- Compensating Controls: Steps that you have taken to manually offset or mitigate risk.
Each individual risk in the risk categories have a system default risk score.
Compensating controls reduce the risk score of individual risks, resulting in
an effective risk score. The exposure score of a device comes from
combining the effective risk scores of all risk factors associated with the device.
After Device Security calculates the exposure score, it incorporates the
impact factor to determine the final device risk score. The impact factor
calculates the percentage increase of the exposure score, with the
percentage increase determined by the device’s asset criticality. For example, if
two devices have the same exposure score, but one has an asset criticality of high,
while the other has an asset criticality of low, the device with a high
asset criticality will have a higher impact factor, and therefore a
higher device risk score.
The impact factor of a device must be 0 or greater, so the impact factor can't
reduce the exposure score. The device risk score will always be equal to or greater
than the exposure score.
Device Profile Risk
Device Security displays risk scores for device profiles in the Risk column on the Profiles page (AssetsProfiles).

For example, if five devices in the same profile have individual
risk scores of 42, Device Security would calculate the risk score for
the profile to be 89. In this case, because all of the devices in
the profile are at risk, the profile score becomes higher than you
might have expected at first.
Consider another example, again with five devices in the same
profile. One device is at high risk with a score of 98. The other
four devices are at normal risk each with a score of 30. In this
case, Device Security calculates the risk score for their profile to
be 64. In such a small set, the one high-risk device has a much
greater impact on the profile score than it would if the scores
of more devices had been involved in the calculation.
Site Risk
See the Risk Score column in the Risk column on the Sites page (NetworksNetworks and SitesSites).

The formula that Device Security uses to calculate the risk score
for a site uses a weighted average of device profile risk scores,
the weight for each profile being determined by the number of devices
in the profile and the profile risk level.
Organization Risk
See the Risk Score in the Risk panel on the DashboardsSecurity Dashboard.

Device Security uses the same method to calculate the risk score
for an organization as it does for sites.
Risk Scores and Severity Levels
The following explains how the severity of a risk score
is ranked:
Risk score | Risk severity | Notes |
---|---|---|
< 40 | Low | This is a normal risk level. |
40-69 | Medium | There might be a few anomalous network behaviors, medium-level alerts, and vulnerabilities with CVSS (Common Vulnerability Scoring System) scores between 4.0 and 6.9. |
70-89 | High | There might be multiple highly anomalous behaviors, high-level alerts, and vulnerabilities with CVSS scores between 7.0 and 8.9. |
90-100 | Critical | There might be multiple extremely anomalous behaviors, critical alerts (such as a malware attack), and vulnerabilities with the highest CVSS score of 10. |
Alerts for Risk Score Changes
When the increase of a risk score causes it to cross
a threshold separating one risk level from another, Device Security
generates a risk change alert. (Crossing a risk level threshold
as the result of a risk decrease does not trigger an alert.) A risk
increase triggers an alert with differing severity levels depending
on the new severity of the risk:
- Warning when the risk level increases from high to critical
- Caution when the risk level increases from medium to highTo reduce the overall number of alerts generated, no alert is triggered when the risk level increases from low to medium.
In addition to risk scores changing because of a manually adjusted
risk factor, they can also change for the following reasons:
Increased risk
- A daily risk refresh discovers new vulnerabilities or increased CVSS risk scores.
Decreased risk
- A user resolves a risk factor.
- A daily risk refresh discovers reduced vulnerabilities or decreased CVSS scores or mitigated risks.
Resolve Risks
You can resolve vulnerabilities and security alerts through a workflow built into
Device Security. Resolve them by either remediating, mitigating, or
ignoring the vulnerability or alert. As a result, the device risk score might
lower depending on other contributing factors such as the severity of the risk and
the number and severity of other risks. When you resolve vulnerabilities, they no longer
contribute to the device risk score. Resolving a vulnerability or alert on a device
might similarly affect its profile, site, and organization risk scores depending on how
significant of an impact the change makes in relation to the number and risk levels of other
devices in the same group. For information about resolving vulnerabilities and
security alerts, see Vulnerability Details Page and
Act on Security Alerts.