Overview

The Resources feature empowers product security leaders to identify, map, and prioritize critical resources within complex cloud environments. By leveraging Jit's Context Engine, Resources provides a comprehensive view of all code repositories and cloud services, helping you focus remediation efforts on the assets that matter most.

The Resource Dashboard

The Resource Dashboard is the first screen you encounter accessing the Resources feature. It offers a high-level summary of your resources, grouped by key Priority Factors influencing their criticality.

Key Components

Priority Factor Tiles

At the top of the dashboard, you'll see tiles representing different priority factors such as:

  • Production Environment
  • Internet-Facing
  • Database Access
  • Business-Critical Service

Each tile displays the number of resources that fall under that specific priority factor and the aggregated risk score for resources within each priority factor, helping you quickly identify areas of concern. Click on any priority factor tile to view resources associated with that factor.

Link to all resources

Above the priority factor tiles, there's a link to see all resources. Clicking this button lets you view a comprehensive list of all your resources, regardless of their associated priority factors.

The Resource Table

After selecting a priority factor or clicking the All Resources button from the dashboard, you're taken to the Resource Table. This screen lists all relevant resources, providing detailed information to help you assess and prioritize each one.

Key Components

Resource Table

A tabulated list of resources with the following columns:

ColumnDescriptionExample
NameThe name of the code repository or cloud service.jit/react
Typecode repository or cloud service.Repository
Risk ScoreThe numerical score represents the resource's criticality based on unresolved security issues and priority factors created by the context engine.85
TeamThe team that is responsible for the repository.The A-team
Priority FactorsLabels indicating which priority factors apply to each resource.Production,

Sorting and Filtering

Options to sort resources by the table properties.

Link to all associated findings

When you click the link to the Backlog on the top right corner of the screen, it is filtered to display only the findings associated with the resources in your current view. This also presents the distribution of the criticalities of these findings. For example, if the Resource Table is filtered to show only resources with the priority factor "Production", the link will lead to a Backlog view displaying only the findings found on production resources.

The Resource Page

Clicking on a specific resource from the Resource Table takes you to the Resource Page, which provides an in-depth view of the selected resource, including its connections, security issues, and detailed properties.

Key Components

Priority Factors and Risk Score

At the top, the resource is labeled with its priority factors, such as "Production Environment" or "Externally Accessible," indicating why it's critical. The risk score is calculated by summing the weights of each assigned priority factor, reflecting the resource's overall criticality.

You can manually adjust the priority factors to accurately represent the resource's importance. Once you change a priority factor, it will affect the priority of the resource and its associated findings from that point forward, making it a reliable way to preserve and maintain accurate information about your assets.

Context engine graph

Below the risk score, the Context Engine Graph visually maps how the resource connects to other elements in your environment. This visualization helps you understand relationships and potential impact pathways, illustrating how vulnerabilities might propagate. Importantly, the graph can be used as a justification or explanation of how the priority factors were concluded. By examining the connections and dependencies shown in the graph, you can see why certain priority factors apply to the resource based on its interactions within your environment.

Findings

Further down, the Findings section lists all unresolved security issues associated with the resource. Each finding includes details like the issue name, severity, type, and detection date, allowing you to assess vulnerabilities and plan remediation steps.

Findings by criticality

At the top-right corner, a summary categorizes the findings by their severity levels—Critical, High, and Medium/Low. This breakdown helps you understand the distribution of severities among the findings for this asset