- October 13, 2023:
affects_rating_details
parameter. - September 27, 2023: Shortcut to individual risk vectors.
- January 17, 2023: Added descriptions of
cvss
parameters and results.
https://api.bitsighttech.com/ratings/v1/companies/entity_guid/findings
Get an organization’s finding details.
- This includes the finding details of risk types that affect or will affect security ratings; Compromised Systems, Diligence (except Domain Squatting), and User Behavior (File Sharing).
Does not include Domain Squatting, Security Incidents, and Other Disclosures.
- This does not include Domain Squatting and Public Disclosures (Security Incidents and Other Disclosures), as their findings cannot be queried via the API.
The return is limited to 100 results per page by default. Refer to the pagination fields (links
, previous
, next
) to navigate multiple pages of results. Use the limit
and offset
parameters to modify this limit. You can also use the affects_rating
parameter to filter findings that have an impact on the letter grade by setting it to true
or the opposite by setting it to false
.
To view all findings, ensure the affects_rating
parameter is not included.
Parameters
Risk Category Parameter
To get details on specific risk categories, use the risk_category
parameter along with the following comma-separated values [String]:
Compromised Systems
Diligence
User Behavior
Risk Vector Parameter
To get details on specific risk vectors, use the risk_vector
parameter along with the following comma-separated values [String]:
Compromised Systems
- Botnet Infections =
botnet_infections
- Spam Propagation =
spam_propagation
- Malware Servers =
malware_servers
- Unsolicited Communications =
unsolicited_comm
- Potentially Exploited =
potentially_exploited
Diligence
- SPF Domains =
spf
- DKIM Records =
dkim
- TLS/SSL Certificates =
ssl_certificates
- TLS/SSL Configurations =
ssl_configurations
- Open Ports =
open_ports
- Web Application Headers =
application_security
- Patching Cadence =
patching_cadence
- Insecure Systems =
insecure_systems
- Server Software =
server_software
- Desktop Software =
desktop_software
- Mobile Software =
mobile_software
- DNSSEC Records =
dnssec
- Mobile Application Security =
mobile_application_security
- Web Application Security =
web_appsec
- Domain Squatting - Findings for this risk vector cannot be queried via the API
User Behavior (File Sharing)
User Behavior = file_sharing
Query Parameters
See query parameters for details on the following parameters:
fields
format
limit
(default:100
)offset
(default:100
)q
sort
Parameter | Description | Values |
---|---|---|
affects_ratingQuery |
Filter by findings that have an impact on the letter grade. | [Boolean] true = Include only the findings that have an impact on the letter grade. |
affects_rating_detailsQuery |
Filter the result by the value of does_not_affect_rating_reason . |
[String] Values may be used in combination.
|
assets.assetQuery |
Filter by asset. | [String]
|
assets.categoryQuery |
Filter by asset importance. | [String] See asset importance. |
assets.combined_importanceQuery |
Filter by combined asset importance. | [String] Comma-separated asset importance. |
assets.hosted_byQuery |
Filter by the hosting provider. | [String] Hosting provider’s unique identifier [entity_guid ]. See GET: Portfolio Details. |
attributed_companies.guidQuery |
Filter by companies in your Ratings Tree that are attributed to the finding. | [Array] Comma-separated My Company or SPM Subsidiary unique identifiers [entity_guid ]. See GET: Portfolio Details. |
attributed_companies.nameQuery |
Filter by companies in your Ratings Tree that are attributed to the finding. | [Array] Comma-separated company names. |
details.cvss.base_gteQuery |
Include findings with vulnerabilities with a CVSS score greater than or equal to this value. | [Decimal] 1 to 10 |
details.cvss.base_lteQuery |
Include findings with vulnerabilities with a CVSS score less than or equal to this value. | [Decimal] 1 to 10 |
details.gradeQuery |
Filter by Diligence finding grade or N/A for Compromised Systems and User Behavior findings. Incompatible with |
[String] Finding grades:
|
details.grade_gtQuery |
Include a range from the selected Diligence finding grade to GOOD. Incompatible with |
[String] NEUTRAL < BAD < WARN < FAIR < GOOD |
details.grade_ltQuery |
Include a range from the selected Diligence finding grade to BAD.
Incompatible with |
[String] NEUTRAL < BAD < WARN < FAIR < GOOD |
details.infection.familyQuery |
Filter by infections. |
[String] Comma-separated infection names. Example:
|
details.observed_ips_containsQuery |
Include findings from a particular IP address. | [String] IP Address |
details.vulnerabilities.severityQuery |
Filter by vulnerability severity. | [String] The Bitsight severity of vulnerabilities. |
evidence_keyQuery |
Filter by the company’s asset (domain or IP address) that’s attributed to the finding. | [String]
|
expandQuery |
Include additional information. | [String]
|
first_seenQuery |
Include findings that were first seen on this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
first_seen_gtQuery |
Include findings that were first seen after this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
first_seen_gteQuery |
Include findings that were first seen on and after this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
first_seen_ltQuery |
Include findings that were first seen prior to this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
first_seen_lteQuery |
Include findings that were first seen on and prior to this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
guidPath |
Identify the company to query. | [String] Portfolio company’s unique identifier [entity_guid ]. See GET: Portfolio Details. |
last_remediation_status_dateQuery |
Include findings that last had a remediation status change on this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_remediation_status_date_gtQuery |
Include findings that last had a remediation status change after this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_remediation_status_date_gteQuery |
Include findings that last had a remediation status change on and after this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_remediation_status_date_ltQuery |
Include findings that last had a remediation status change prior to this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_remediation_status_date_lteQuery |
Include findings that last had a remediation status change prior to and on this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_remediation_status_labelQuery |
Filter by the current remediation status of the finding. | [String] The remediation status of the finding:
|
last_seenQuery |
Include findings that were last seen on this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_seen_gtQuery |
Include findings that were last seen after this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_seen_gteQuery |
Include findings that were last seen on and after this date.
Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_seen_ltQuery |
Include findings that were last seen prior to this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
last_seen_lteQuery |
Include findings that were last seen on and prior to this date. Incompatible with |
[String] Date [YYYY‑MM‑DD ] |
remediation_assignmentsQuery |
Filter by users assigned to the findings. | [String] Comma-separated user unique identifier [user_guid ]. See GET: Users. |
risk_vector_labelQuery |
Filter by particular risk vectors. Does not include Domain Squatting, Security Incidents, and Other Disclosures. |
[String] Comma-separated risk vector slug names. See risk types. |
severityQuery |
Filter by finding severity. | [Decimal]
|
severity_gtQuery |
Include finding severity that are of greater severity. | [Decimal]
|
severity_gteQuery |
Include finding severity that are of greater or equal severity. | [Decimal]
|
severity_ltQuery |
Include finding severity that are of lesser severity. |
[Decimal]
|
severity_lteQuery |
Include finding severity that are of lesser or equal severity. |
[Decimal]
|
severity_categoryQuery |
Filter by finding severity. | [Decimal]
|
tags_containsQuery |
Filter by infrastructure tags. | [String] Infrastructure tags, which are defined by the company to identify assets that belong to them. |
unsampledQuery |
If you have Unsampled Findings [beta] enabled, get your My Company’s or SPM Subsidiary’s unsampled findings data. | [Boolean]
|
vulnerabilitiesQuery |
Filter by vulnerability. | [String] Comma-separated vulnerability name. |
Example Request
curl https://api.bitsighttech.com/ratings/v1/companies/A9Jq47BBjea129322347d12e29c54b488752b3b71e/findings -u api_token:
Example Response
{ "links":{ "previous":null, "next":null }, "count":1, "results":[ { "temporary_id":"A9Jq47BBjea129322347d12e29c54b488752b3b71e", "affects_rating":false, "assets":[ { "asset":"11.111.111.111", "category":"high", "importance":0.09, "is_ip":true } ], "details":{ "cvss": { "base": [ 10.0 ] }, ⊕ See Finding Details: "evidence_key":"11.111.111.111:23", "first_seen":"2019-05-29", "last_seen":"2019-12-20", "related_findings":[ ], "risk_category":"Diligence", "risk_vector":"open_ports", "risk_vector_label":"Open Ports", "rolledup_observation_id":"_aAAa1AA_a1aAA1A1aaAAa==", "severity":10.0, "severity_category":"severe", "tags":[ "Remote Office" ], "remediation_history":{ "last_requested_refresh_date":null, "last_refresh_status_date":null, "last_refresh_status_label":null, "last_remediation_status_label":"Work In Progress", "last_remediation_status_date":"2020-08-18", "remediation_assignments":[ "11111111-aaaa-1111-aaaa-111111111111" ], "last_remediation_status_updated_by":"Arnold Brown" }, "asset_overrides":[ { "asset":"11.111.111.111", "importance":"high", "override_importance":null } ], "duration":null, "comments":"User from Actors Films said: \"Look at this finding\" at 2018-11-29 20:30 UTC;\nArnold Brown said: \"I changed the remediation status.\" at 2020-08-18 18:38 UTC", "attributed_companies":[ { "guid":"44444444-cccc-4444-cccc-444444444444", "name":"Actors Film Studio" } ] }, } ] }
Response Attributes
Field | Description | ||
---|---|---|---|
linksObject |
Navigation for multiple pages of results. See pagination. | ||
previousString |
The URL to navigate to the previous page of results. | ||
nextString |
The URL to navigate to the next page of results. | ||
countInteger |
The number of findings. | ||
resultsArray |
Findings and their details. | ||
temporary_idString |
A temporary identifier for this finding. | ||
affects_ratingBoolean |
Indicates if this finding has an impact on the letter grade. | ||
assetsArray |
Asset details. | ||
assetString |
The asset (IP address or domain) associated with this finding. | ||
categoryString |
The Bitsight-calculated asset importance. | ||
importanceDecimal |
For internal Bitsight use. | ||
is_ipBoolean |
true = This asset is an IP address. |
||
detailsObject |
Details of this finding. The included keys vary, depending on the risk type. | ||
cvssObject |
If the finding has an associated vulnerability, the CVSS score is listed below. | ||
baseArray |
The list of CVSS scores of vulnerabilities associated with this finding. | ||
evidence_keyString |
The company’s asset (domain or IP address) that’s attributed to the finding.
The IP addresses of other companies are masked, in accordance with our responsible disclosure policy. Please review our terms and conditions, and then update your IP Visibility configurations accordingly. |
||
first_seenString [ YYYY‑MM‑DD ] |
The date of the first observation. | ||
last_seenString [ YYYY‑MM‑DD ] |
The date of the most recent observation. | ||
related_findingsArray |
Details of related findings. | ||
risk_categoryString |
The risk category associated with this finding. | ||
risk_vectorString |
The slug name of the risk vector associated with this finding. | ||
risk_vector_labelString |
The name of the risk vector associated with this finding. | ||
rolledup_observation_idString |
An identifier for findings. | ||
severityDecimal |
The severity of the finding, which is the measured risk that this finding introduces. | ||
severity_categoryString |
The slug name of the finding severity. | ||
tagsArray |
Infrastructure tags that help identify this asset. | ||
remediation_historyObject |
If expand=remediation_history parameter is set, the remediation history of the finding is included. |
||
last_requested_refresh_dateString [ YYYY‑MM‑DD ] |
The date when a finding refresh that included this finding was last requested. | ||
last_refresh_status_dateString [ YYYY‑MM‑DD ] |
The date when a refresh of the remediation status of this finding was last requested. | ||
last_refresh_status_labelString |
The current finding refresh status of this finding. | ||
last_remediation_status_labelString |
The current remediation status of this finding. | ||
last_remediation_status_dateString [ YYYY‑MM‑DD ] |
The date when the remediation status of this finding was last changed. | ||
remediation_assignmentsArray [ user_guid ] |
The users who are assigned to remediate this finding. | ||
last_remediation_status_updated_byString |
The name of the user who updated the remediation status of this finding. | ||
asset_overridesArray |
User-assigned asset importance details. | ||
assetString |
The domain or IP address. | ||
importanceString |
The user-assigned asset importance. | ||
override_importanceNull |
For internal Bitsight use. | ||
durationNull |
For internal Bitsight use. | ||
commentsString |
A thread of finding comments. | ||
attributed_companiesArray |
Companies in the Ratings Tree that are attributed to the finding. | ||
guidString [ entity_guid ] |
The unique identifier of this company. | ||
nameString |
The name of this company. |