Compliance Management

Sentinel Compliance Tracking is a unified vulnerability management platform designed to consolidate findings from various scanners, tools, and manual inputs into a single, structured system. It enables administrators and IT security engineers (ITSE) to track, manage, and remediate compliance-related findings across projects and products.


Key Components

  • Projects: High-level containers for organizing compliance initiatives (e.g., Host Compliance, Network Device Compliance 2025).

  • Products: Sub-components under a project representing specific assets or systems (e.g., Product A, Campus Network).

  • Plugins: Scripts used to parse raw scanner output and normalize findings.

  • Tags: Labels applied to findings (e.g., for manual entries or categorization).

  • API: Programmatic interface for uploading results and integrating with external tools.


Workflow Overview

Step 1: Create a Project

  • Role: Admin/ITSE

  • Action: Navigate to the Compliance Module and create a new project (e.g., "Host Compliance").

  • Purpose: Organize compliance efforts by initiative or scope.

Step 2: Create Products Under the Project

  • Role: Admin/ITSE

  • Action: Within the selected project, create one or more products (e.g., "Product A", "Campus Network").

  • Purpose: Segment assets or systems for granular tracking.

Step 3: Upload Findings

  • Role: Admin/ITSE

  • Action:

    • Go to the selected product.

    • Upload raw scanner output using predefined plugins (scripts that parse and normalize data).

    • Apply tags for manual findings or additional context.

    • Alternatively, use the API to submit results programmatically.

  • Purpose: Ingest findings into Sentinel for processing and tracking.

Step 4: Processing Findings

  • Plugins parse the uploaded data and populate findings in the system.

  • Severity Handling:

    • If the compliance scan includes severity levels, those are retained.

    • If no severity is provided, the default is set to Medium.

  • Tags help categorize findings (e.g., "manual", "network-device").

Step 5: Status Tracking and Updates

  • Each time new data is uploaded, Sentinel compares it against existing records in the database.

  • Matching Criteria: Findings are matched based on:

    • Same source plugin.

    • Same tags.

  • Actions:

    • New findings are added.

    • Existing findings are updated (e.g., status changes, severity adjustments).

    • Resolved or outdated findings are archived or marked accordingly.

Step 6: Unified Management

  • All findings—whether from automated scans, tools, or manual inputs—are consolidated into a single platform.

  • Provides a centralized view for vulnerability management, reporting, and remediation tracking.


4. Key Features

  • Flexible Inputs: Supports both file uploads and API integrations.

  • Normalization: Plugins ensure consistency in data format and severity.

  • Real-Time Updates: Automated matching and updating reduce manual effort.

  • Tagging System: Enables detailed categorization and filtering.

  • Comprehensive Coverage: Handles diverse sources (scanners, tools, manual entries).


5. API Integration

  • API details will be covered in a separate document.

  • Expected functionalities:

    • Submit scan results.

    • Retrieve project/product details.

    • Update finding statuses.

  • Authentication and endpoints to be specified.

Last updated