Portfolio Risk: Critical Assets Ingrid The Critical Assets page [ Portfolio Risk ➔ Critical Assets] in the Continuous Monitoring application provides comprehensive visibility into digital asset intersections with vendors. Strategically target, contain, and monitor critical connections with vendors’ digital products and services. Manage risk and exposure of specific vendor assets. Monitor and address issues (such as vulnerabilities, malware infections, and other critical exposures) within critical digital assets affecting the supply chain. Actions Download Critical Asset Data Instructions: Select the Download option at the top-right of the table. Filter the Data Instructions: Use the filter options on the left. Search Assets Instructions: Use the search bar at the top-right to search by country, company name, and asset (name). Unmonitor Assets Instructions: Use the Checkboxes to the left of the assets in the table to select assets ( selected). Select the Unmonitor button at the top of the table. Select the Yes checkbox to confirm and proceed with unmonitoring the selected assets. Select Unmonitor. Upload Assets to be Monitored Upload assets to be monitored in bulk. By uploading your file you agree to the Bulk Monitoring Disclaimer. Instructions: Create a CSV file listing third party assets. Include the following columns with a maximum of 500 rows: asset = Identify the asset by IP address or domain name. company-guid [entity_guid] = Identify the company that should be attributed to the asset by their unique identifier. See GET: Portfolio Details. Select the Upload Assets button at the top-right of the page. Upload the file (drag & drop or select from your directory). Select Continue. Vulnerability Evidence Details View the Vulnerability Evidence Details sheet. Instructions: Select an asset from the table. Fields Asset The name of the asset. Asset Type The type of asset. Company The company that owns the asset. Country The country where the asset resides. Findings The number of findings in the asset. Importance The asset importance. Material/Severe Findings The number of material and severe assets. Filters Asset Type Filter by asset type. Values: See asset types. Importance Filter by asset importance. Values: See asset importance. Number of Findings Limit by the number of findings. Values: The minimum & maximum number of findings to include. February 4, 2025: View the Vulnerability Evidence Details instructions. November 8, 2024: Published. Related articles Continuous Monitoring Application Asset Importance Finding Behavior Marsh McLennan Study: Correlation Between Bitsight Analytics and Cybersecurity Incidents How is the Web Application Headers Risk Vector Assessed? Feedback 0 comments Please sign in to leave a comment.