Skip to content

Operations Module Overview

The Operations module serves as the central hub for security assessment tracking, managing assets discovered during engagements, vulnerabilities identified by scanning tools, and physical security data from field operations. It provides sophisticated import capabilities, relationship mapping, and validation workflows to support the complete assessment lifecycle.

Maintain a comprehensive inventory of discovered assets including:

  • IP Addresses - Network hosts and endpoints
  • Hostnames - Domain names and DNS records
  • Email Addresses - Discovered email accounts
  • Credentials - Leaked or compromised credentials
  • Badges - Company identification badges
  • Physical Addresses - Location information
  • Custom Asset Types - User-defined asset categories

Track security findings with complete metadata:

  • Severity Levels - Critical, High, Medium, Low, and Informational classifications
  • CVSS Scoring - Common Vulnerability Scoring System metrics with vector strings
  • CVE/CWE Tracking - Link to Common Vulnerabilities and Exposures and Common Weakness Enumeration
  • Status Workflow - Progress vulnerabilities through open, confirmed, remediated, false positive, and accepted states
  • Manual Validation - Document validation evidence and notes

Track physical penetration testing data from ATLAS imports:

  • Field Notes - Observations and documentation from field operations
  • Points of Interest (POIs) - Geographic locations with coordinates
  • RFID Cards - Captured card data with facility codes
  • Captured PINs - PIN codes associated with access control
  • Magstripe Cards - Magnetic stripe data with track information

Multi-format import system supporting major security tools:

  • Automatic format detection
  • Intelligent deduplication
  • Asset-vulnerability relationship mapping
  • Import tracking with success/failure reporting
🖥️ Operations Module Dashboard with Statistics Screenshot

Multi-select filtering system with options for:

  • Project and component selection
  • Asset type filtering
  • Status and severity levels
  • Import source tracking
  • Service and protocol filtering

Modern floating window interface for viewing and editing:

  • Minimize and restore windows
  • Side-by-side comparison
  • Quick navigation between records
  • Inline editing capabilities

Efficient bulk processing for:

  • Creating multiple records at once
  • Batch status updates
  • Bulk validation with shared notes
  • Mass deletion with confirmation

Live dashboard showing:

  • Total assets and active counts
  • Vulnerability severity breakdown
  • Validation progress metrics
  • Component-level statistics

Automatic relationship tracking:

  • Map vulnerabilities to affected assets
  • Track ports, protocols, and services
  • Aggregate related data across mappings
  • Navigate between related records

Structured validation process:

  • Mark vulnerabilities as manually validated
  • Record validation notes and evidence
  • Track validator and validation date
  • Bulk validation support
flowchart LR
    A[Import Scans] --> B[Review] --> C[Validate]
    C --> D{Status}
    D -->|Confirmed| E[Map to Report] --> F[Remediation]
    D -->|False Positive| G[Archive]
FormatExtensionDescription
Burp SuiteXML, HTMLWeb application scanner results
NessusXMLVulnerability scanner findings
NexposeXMLRapid7 vulnerability data
NodeZeroCSVAutonomous penetration testing results
BloodHoundZIPActive Directory attack paths
ATLASJSONPhysical security field data
NmapXMLNetwork discovery and port scanning
NucleiJSONTemplate-based vulnerability scanning
SPEAR FormatJSONStandardized import format

The Operations module is organized into three main areas:

The Operations module integrates with:

  • Projects - Assets and vulnerabilities are scoped to projects and components
  • Reporting - Vulnerabilities can be mapped to report findings
  • Import System - Unified import processing for all supported formats
  • User Management - Validation tracking includes user attribution