Nipper Summary
The integration of Nipper with the Centraleyezer Vulnerability Management platform enhances the import and management of security findings related to network device configurations and vulnerabilities. This collaboration enables organizations to efficiently identify, prioritize, track, and remediate vulnerabilities, thereby improving their overall security posture and risk management.
Nipper Key Features
Data Import:
Import security findings from Nipper into Centraleyezer, either on-demand or via automated schedules.
- Supported formats: XML, CSV.
Detailed Findings:
Centraleyezer provides comprehensive details on issues detected by Nipper tools.
Risk Scoring:
Configurable severity values for Nipper findings, adjustable based on organizational risk policies.
Selective Data Import:
Supports filtering based on status, scan type, and severity for more precise data imports.
Considerations
The integration supports mapping one Nipper instance with one Centraleyezer instance.
Configuring a different Nipper instance in the plugin will overwrite previously imported data.
Requirements
System Requirements:
Centraleyezer Prerequisites: Latest version of the Centraleyezer Vulnerability Management Platform recommended.
Nipper Prerequisites: API access must be enabled with proper authentication and must support export of findings and API-based integration.
Permissions and Roles:
Centraleyezer: Requires System Admin or Application Security Manager permissions.
Nipper: User access for configuration and vulnerability information.
Import mappings require admin-level permissions.
Release Notes
Version 1.0.0:
New mappings for findings from Nipper include:
Name (Issue Title)
Asset (Devices)
Criticality (Rating)
Description (Finding)
Recommendation