Dashboard Actions
Explore all available dashboard actions in Sprinto to manage vulnerabilities—from integration and uploads to evidence tracking and resolution.
The Vulnerabilities section in Sprinto enables you to monitor, assess, and act on security threats across your infrastructure, codebase, and endpoints. This article provides an overview of the key actions you can perform from the dashboard to manage vulnerabilities effectively and maintain compliance.
Each action is linked to a specific step in the vulnerability management lifecycle—from detection to closure.
Available Dashboard Actions
1. Set Up Vulnerability Monitoring Source
Connect Sprinto to your existing security tools and scanners (e.g. AWS Inspector, Snyk, GitLab, Google Security Center). Once integrated, Sprinto will automatically ingest vulnerability logs, create system-status checks, and track resolution status against SLAs.
2. Upload Pentest Report and Add Vulnerabilities
If vulnerabilities are discovered through periodic penetration testing, you can upload the pentest report directly into Sprinto and log each vulnerability—either manually or via CSV bulk import.
This ensures your findings are tracked and audited alongside scanner-based vulnerabilities.
3. Resolve Vulnerabilities
Resolve open vulnerabilities either by:
Fixing them at the source system (for integrated scanners), or
Manually closing them in Sprinto (for pentest-reported issues).
Sprinto tracks each vulnerability's status and automatically marks the associated check as Passing when resolution is confirmed.
4. Mark Vulnerabilities as Special Cases
If a vulnerability is non-applicable, out of scope, or temporarily unresolvable, you may mark it as a Special Case. This prevents check failures while maintaining audit visibility. You can also set an expiry date for temporary exceptions.
5. Create and Manage Workflow Checks
Use workflow checks to track manual vulnerability-related processes such as external ASV scans, network checks, or application-level reviews. You can configure predefined or custom checks with frequency, assignees, and evidence instructions.
6. Run and Monitor Workflow Checks
Stakeholders can upload evidence to complete assigned workflow checks. Sprinto monitors the check status in real time and flags overdue or missing submissions as Critical or Failing.
Summary
The Vulnerabilities dashboard actions are designed to support both automated and manual compliance strategies. Whether you rely on integrated scanners or perform security tasks independently, Sprinto helps you:
Maintain a complete audit trail
Monitor and enforce SLAs
Ensure no vulnerabilities are left unmanaged
Use the dashboard actions collectively to build a resilient and compliance-ready security posture.
Last updated