Permissions and Designations

Because Ryskview typically has sensitive data, users cannot create user accounts themselves.  User accounts are created by an Application Administrator.  Users have permissions, which govern what Program Offices and Systems are accessible to the user, and designations, which are the roles that a user may have for a Program Office of System.  The combination of […]

Ryskview Structure

Ryskview organizes the hierarchy of information into three groups: Program Offices, Systems, and Assets. This structure allows users to properly outline the boundaries of their information systems and the responsibilities of each device that falls within them. Program Offices Program Offices are the highest tier in the hierarchy. They are typically a physical location where […]

System Summary Page

The system summary page provide more detailed metrics for the selected system. The image below show a compilation of data points, graphs, and tiles that give users more insight into their system’s risks factors. Here is a breakdown of each metric available under the system summary tab:

Vulnerability Solutions and Guidance

Ryskview provides the ability to share solutions and guidance across the application. When you see a a wrench icon [insert icon here], this mean that there is a solution uploaded for that vulnerability. The icon will appear anywhere in Ryskview where that vulnerability ID occurs, meaning that the user does not have to search for […]

Assets Page

In the Assets page, information is displayed for the Assets (computer, server, switch, etc) that are in Ryskview. The Assets shown are based on the permissions the user has associated with their account. For example, a System Admin with permissions to two Systems in Ryskview will see the Assets within those two Systems. The following […]

User Profile

Users can access their user profile by clicking the pencil icon next to their name on the menu bar. In the user profile, there are three tabs. Profile Details The user can update Phone Number and Notes section. The other information displayed can only be changed by the Ryskview System Administrator. Permissions In this tab, […]

Rysk Score

The Rysk Score is a core component of Ryskview. The intent of the Rysk Score is provide a context-informed severity rating for Assets and Systems. While vulnerability assessment tools typically provide severity ratings with no regard to the computing environment, Ryskview’s Rysk Score incorporates many environmental variables into the algorithm. These include: Impact of Exploitation […]

Dashboard

The Dashboard is the landing page after logging into Ryskview. It is customized to each user based upon their designated roles such as System Admin, ISSO, CIO, etc). Each tab is role-based, so a user may have more than one tab, if designated as more than one. The Dashboard consists of multiple informational tiles. Tiles […]

Create and Populate a New System

Note: Completing the additional fields is optional but recommended to assist with riskmanagement. Rysk Score is assigned by Ryskview. The Authorization Type and A & A System fields allow you to link systems that are usedacross multiple locations and Program Offices. More details are provided in the next section,Multi System Management.Authorization Effort entries: The Attachments […]

Introduction And Features

Ryskview is a cyber risk management system that provides a platform for communicating, tracking, prioritizing, and aggregating risk data across a Program Office or Enterprise. Ryskview manages risk data through the full lifecycle from assessment to closure. There are four primary components of the application.