For IT departments, every minute counts when a new security vulnerability in essential software libraries, technologies, and cloud services becomes public. A service catalog enriched with data insights helps to instantly start and navigate the mitigation process.
How it works
You can then query the service catalog to locate which services are affected by the respective security vulnerability (e.g., the library “Log4j 2”).
Pinpoint its impact across your system landscape – whether it’s on direct or transitive dependencies
Isolate which teams and products are affected
Contact the owners of the affected services and the on-call engineers. Together, decide on mitigation initiatives while considering the following criteria for prioritization:
Until all services are upgraded to the latest library version, leverage dashboards, and reports to continuously track and monitor mitigation efforts from across teams.
Just because the public knows about a threat, it doesn’t mean malicious hackers haven’t already taken advantage of the vulnerability and entered your environment. Detect and actively address anomalies by running search queries in log entries and log analytics.
Take your capabilities the next level and arm yourself with the knowledge you need
Introducing LeanIX Value Stream Management
How we mitigated the log4j vulnerability "Log4Shell" within 48 hours
Log4Shell Remediation Status and LeanIX's SaaS Catalog
Overcoming Communication Barriers for Microservices