1. Home
  2. Getting Started
  3. Getting Started Guide

Getting Started Guide

This is a step-by-step guide to configuring your Phoenix Security account to start gathering and managing vulnerabilities.

To help you get your Phoenix Security account up and running, here are the main steps you need to complete:

1. Connect Scanner.

  1. On the Navigation Menu, select Integrations > Scanners.
  1. Hover over the scanner to be added and click on the tab to enter more details.
  1. Enter scanner details:
    • Scanner name – name you wish to call the scanner
    • Server URL – URL of server eg https://api.snyk.io/
    • User code – code given when scanner account was created 
    • PassCode – passcode made when account was created 
  1. A “target” refers to the specific URL/location of an asset, such as a website, that is to be scanned. Fields required:
    • Target URL: The specific URL of the website or system that will be scanned.
    • Target Type: The type of the asset, like a website, which provides context for the scanning process.
    • Maximum Duration: The maximum time allotted for the scanning process to complete.
    • Start Time: The specific start time when the scan is scheduled to begin in minutes.
    • Schedule: Defines how often the scan is to be run, such as once, daily, weekly, etc.
  1. Click “Create Scanner“. 

After the scanner integration is created the new entry appears on the Scanners list page. (Here showing the example from above highlighted in red.)

2. Create Applications.

To create an Application, follow these steps:

  1. On the Navigation Menu, select Risk Explorer > Applications.
  1. Click the “Add Application” button on the right-hand side.

Step 1

  1. Complete the following fields:
  • Application Name – name assigned to the Application.
  • Risk tolerance – sets the risk tolerance level for the Application.
  • Value – the monetary value to the organisation. 
  • Criticality – determines how critical the Application is to the organisation. 
  • Accountable User – assigns the person or user primarily accountable for the Application. 
  •  Responsible users – assigns the users responsible for the application
  1. Click “Next” once all fields are filled.

Step 2

  1. Enter Component Name – the name you want to label the component as.
  1. Select the Asset Selection Mode – automatic being the default selection.

Step 3

In this stage you will be given the option to add tags which you can use to identify the application and help search for it e.g. adding a tech stack tag of CSS can be used in the application filter to help find it. 

You will also be able to link the application to an issue tracking project which will enable you to create tickets for vulnerabilities/findings linked to the application and start managing the vulnerabilities in an external workflow platform. The option to link to a notification channel will allow you to select a notification channel to receive security updates on.

  1. Add tags and select which integrations you would like – if any fill in details.
  1. Select which environment the application belongs to and the services attached.
  1. Press the “Create Application” button, and the application can be viewed on the application list view.

3. Add Components (from Scanners).

If you didn’t already add a component when you initially made the application or need to add another component, this will direct you to how to do so.

  1. On the Navigation Menu, select Risk Explorer > Applications.
  1.  Select the Application list to view which application you want to add a component to.
  1. Click on the three dots on the right side of the application record to reveal the selection box, then click edit.
  1. Scroll down to the components section and click “Add Component” at the top right corner.

You will now be required to enter details about the component you are adding which is split into 3 stages.

Step 1

a. Enter the name you wish to call your component as.

b. Select if the component should inherit locality factor from environment/services – component will be linked to the environments/services the application is assigned to. 

c. Select the criticality level which will impact the risk level of findings/vulnerabilities associated with this component.

Step 2

d. Enter the name you wish to call the component.

e. Select the asset selection mode, which is automatic and is the default selection.

Step 3

f. Add tags which you can use to identify the component and help search for it e.g. adding a mac tag can be used in the application filter to help find it.

g. If you want to alter the issue tracking project for this component then select “Override Inherited Application’s Issue Tracking” button and fill in details.

If you want to alter the notification channel for this component then select the “Override Inherited Application’s Configuration for Notification” button and fill in details.

  1. On the Navigation Menu, go to Integrations > Workflow.
  1. Click on the 3 dots in the top right of an existing ticketing integration then select “Create new workflow integration”.
  1. Enter configuration details including:
    • Integration name – this is the name that will be displayed on the workflow screen
    • Server url – url of the workflow integration 
    • Username – username made when workflow account was created
    • Access Token – Given when workflow account was created
  2. Press “Create Workflow” once all details have been entered.

5. Create Users.

  1. On the Navigation Menu, click Settings > Users
  1. Click on the “Add User” button on the top right hand side of the screen to add a user.
  1. Fill in new user details including:
  • Email – user email
  • First Name – user first name used to identify users in user table 
  • Last name – user last name used to identify users in user table
  • Phone Number – users phone number 
  • Role – select role of user in organisation
Link to FAQ page with user role definitions: Getting Started Guide
  1. Press “Create” once all details have been entered.
  1. Click “Create” once details have been entered. 

6. Assign Applications to Users.

These steps will show you how to both add accountable users and responsible users to an application to help aid management of applications by making it clear who is responsible but also accountable when things go bad.

  1. On the Navigation Menu, select Risk Explorer > Applications.
  1.  Select “Application list” to view which application you want to add a component to, press on the 3 dots on the right of the application then press edit on the pop up.
  1. Complete following fields:
    • Application Name – name assigned to the Application.
    • Environment/Account – the cloud account where this Application is deployed.
    • Threshold – sets the risk tolerance level for the Application.
    • Value – the monetary value to the organisation. 
    • Criticality – determines how critical the Application is to the organisation. 
    • Accountable User – assigns the person or user primarily accountable for the Application. 
    • Responsible User – assigns users responsible for the application – to save the selected user press save on the drop down once users are  selected.
    • Tags – assigns tags to help identify and search for the Application.
  1. Click “Save” or “Save and Show Applications” to view the application dashboard.

Assign Applications to Jira.

  1. On the Navigation Menu, select Risk Explorer > Applications.
  1.  Select “Application list” to view which application you want to add a component to, press on the 3 dots on the right of the application then press edit on the pop up.
This image has an empty alt attribute; its file name is Screenshot-2024-08-06-at-12.29.09-1024x553.png
  1. To link to an issue tracking project click on the grey box next to “Link to Issue Tracking Project” and fill in fields required:
    • Issue Tracking Account – this is the name given to the workflow when it was created e.g. Jira Demo.
    • Issue Tracking Project – this refers to projects made in the workflow eg in Jira infra backlog is an example of a project.
  1. To link to a notification channel click on the grey box next to “Link to Notification Channel” and fill in fields required:
    • Notification account – this is the name given to the workflow integration when it was created e.g Slack.
    • Notification Channel – this is the name given to the notification channel in the platform.
  1. Click “Save” or “Save and Show Applications” to view the application dashboard.

Creating tickets for findings

Once you have assigned an issue tracking project to an application, as outlined in stage 7 of the getting started guide, you can create a ticket – assign a finding to a project in Jira or another workflow tracking platform.

By clicking on the platform logo indicated by the red arrow, in this case Jira, you are assigning a finding to a workflow project. Once you have created a ticket you will receive a success notification in the top right hand corner to confirm the ticket creation was successful. You can only create tickets for findings linked to an application you have linked an issue tracking project to which is why there isn’t an option to create a ticket for some findings.

Set Risk tolerance

What is the Threshold or Risk Appetite or Risk Tolerance? – refers to the Organisational Threshold or the minimum value the global Risk Tolerance level needs to reach in order to raise the risk level to critical.

Set Risk Tolerance for separate applications

  1. On the Navigation Menu, select Risk Explorer > Applications.
  1.  Select “Application list” to view which application you want to add a component to, press on the 3 dots on the right of the application then press edit on the pop up.
  1. Enter fields shown by the red arrows:
    • Risk Tolerance – this is the risk level you are happy for the application to have before it becomes an issue and vulnerabilities need to be fixed.
    • Value – your valuation of the application.  
  1. Click “Save” or “Save and Show Applications” to view the application dashboard.

Setting global risk tolerance

You can also set a global Risk Tolerance level and override the individual Risk Tolerance or Threshold Level of individual Applications by following these steps:

  1. On the Dashboard, go to the Organisation Risk Evolution section and click the edit button shown by the red arrow.
  1. Enter the new organisation risk threshold and select one of two options:
    • Set without Override – will set the global risk tolerance for apps not assigned a tolerance to the value entered.
    • Override – will set tolerance level for all applications the same even if they already have a value set for them.
Updated on November 20, 2024

Related Articles

x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security