Human Managed app hm.works 1.13 released with dashboard on detected network config and rule violations
Since its first release on 13 March 2023, the Human Managed web app hm.works has been getting fresh updates every single week to report on intel generated from any data source from our customers.
πNote: Read more about our approach to creating intel on your digital business' assets, postures & behavior, and establishing πrelationshipsπ between them to improve your decisions and actions for many use cases.
This week, we are excited to announce the release of a dashboard that reports on the detections of violations on network assets (such as firewalls).
Introducing...
posture violations β

A collection of reports, charts and data grid that present your org's network posture from use cases such as:
firewall config violation
firewall rule violation
router config violation
The posture violation dashboard answers the top 3 things you need to know about your enterprise network posture:
What important checks and rules have our network devices failed on?
What checks and rules should I configure and tune to protect my assets in line with my cyber posture and compliance goals?
Where are the biggest gaps between my preferred posture state and current posture state?
* * *

Before we dive in to the details, some key concepts when it comes to network posture:
posture: a state of a digital asset (read more about our approach to business posture)
policy: a standard that sets the parameters for checks and rules
check: a setting that detects techniques
rule: a setting that blocks techniques
configuration: assignment of policies, checks, and rules
(e.g. a critical firewall's configs of checks and rules may be stricter than a low-criticality firewall's configs, even though they are covered by the same organization network security policy)
assessment: assessment of whether checks and rules are configured according to desired setting
violation: state of failed check / rule / configuration
All these posture states can be monitored as key indicators from your data and adjusted to improve your organizational network posture.
* * *
Let's explore each segment of the posture violation dashboard.
posture violation report

What:
The line chart reports the number of times subscribed violation use cases have been detected by hm.works platform over time.
The table lists all subscribed violation use cases, and the posture indicators that trigger the detection for each use case, and the number of times the indicators are detected over a time period.
πNote: hm.mworks platform uses automated detections consisting of pre-defined conditions, correlation rules and/or machine learning algorithms to identify suspicious or malicious activities and create Detections that need to be actioned.
Why: Gives you improved visibility of violations across your digital assets, so that you an respond faster to mitigate risk and reduce business impact.
How: Forward or connect data (e.g. configs from your existing firewall, vulnerability & threat management tools) to build, configure, and monitor violation use cases on the hm.works platform.
posture violation indicators

What: A collection of charts with key indicators on network posture violation (e.g. violations on critical firewalls, top 10 critical severity violation detections)
Why: Gives you an overview of existing posture violations in your environment and directs the next step to react or resolve the issues (deeper investigation, prioritization)
How: Forward or connect data (e.g. configs from your existing firewall, vulnerability & threat management tools) to build, configure, and monitor violation use cases on the hm.works platform.
posture violation data grid

What: An interactive grid breaks down your organization's posture violations based on:
check name
check severity (critical, high, medium, low)
assessment status (passed / failed)
asset name
asset type (eg. router, firewall)
device IP
asset criticality (critical, high, medium, low)
violation use case (e.g. firewall config violation, firewall rule violation)
detection date
Why: Understand and explore your current state of network posture and violations in detail, identify blockers, and plan for improvements to achieve desired posture goals.
How: Forward or connect data (e.g. configs from your existing firewall, vulnerability & threat management tools) to build, configure, and monitor violation use cases on the hm.works platform.
exploration: by asset criticality & check severity
To quickly drill down to Critical assets with High severity posture violation, apply the following
group by: violation use case > asset type > assessment status > asset criticality > check severity

exploration: by check name
To quickly drill down to assets that have failed specific checks, apply the following
filter: check names
group by: assessment status > check severity


* * *
And that is hm.works 1.13! We will be releasing more features and updates regularly, so stay tuned.
To get the latest news from Human Managed, follow us on LinkedIn and check out our blog.
* * *
Want to discuss how we can help solve your cyber, digital, or risk operations through data?
Want a test run of the hm.works app?
Have any questions or feedback?
Please contact us at hello@humanmanaged.com.