diff --git a/src/content/docs/vulnerability-management/dev-workflow.mdx b/src/content/docs/vulnerability-management/dev-workflow.mdx
index dffc28bb240..fceb713b30f 100644
--- a/src/content/docs/vulnerability-management/dev-workflow.mdx
+++ b/src/content/docs/vulnerability-management/dev-workflow.mdx
@@ -26,7 +26,7 @@ To monitor the health of specific applications or services, use our entity scope
@@ -35,16 +35,16 @@ To monitor the health of specific applications or services, use our entity scope
-The security summary page for an entity gives you a high level overview of the security of your application or service. Curated dashboards such as the number of critical vulnerabilities, visualizations of historical new vulnerabilities, and average time to remediation provide a general summary of the current and historical security of your application or service.
+The security summary page for an entity gives you a high level overview of the security of your application or service. Curated dashboards provide you an overall security of your application or service, including:
-## Identify and remediate vulnerabilities [#identify-vulnerabilities]
+* Total vulnerabitities
+* Vulnerability exposure window
+* Top 5 vulnerabitites in accordance with the priority rankings
+* Vulnerability breakdown by type
+* Libraries severity breakdown
+* Top library upgrades
-There are two main ways to prioritize vulnerabilities:
-
-* Triage and prioritize vulnerabilities yourself
-* Remediate vulnerabilities assigned to you by your security team or others
-
-### Triage and prioritize [#prioritize]
+## Triage, prioritize, and remediate vulnerabilities [#prioritize]
To view all vulnerabilities open for your service or application, select the **Vulnerabilities** tab from the entity security overview page:
@@ -60,7 +60,7 @@ To view all vulnerabilities open for your service or application, select the
-This page shows you all open vulnerabilities and allows you to filter them by attributes such as severity and source. Clicking into a specific vulnerability provides detailed information about its severity, scope, source, and steps to remediation:
+This page shows you all open vulnerabilities and allows you to filter them by attributes such as severity and source. Clicking on a specific vulnerability provides detailed information about its severity, sources, vulnerability status change logs, and many more.
**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > APM & services > (select an entity) > Triage > Vulnerability Management > Vulnerabilities**, click a vulnerability.
-### Solve assigned vulnerabilities [#remediate-vulnerabilities]
+## Set up vulnerability alerts [#alerts-setup]
+
+Set up through Slack or a Webhook to receive notifications when vulnerabilities of a set severity appear.
-Your security team or others may triage vulnerabilities and assign the remediation of individual vulnerabilities to you. To find vulnerabilities assigned to you, select **Vulnerabilities assigned to me** from the entity security summary page:
+On any vulnerability management screen, select **Manage security notifications**
- **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > APM & services > (select an entity) > Triage > Vulnerability Management**, and click **Vulnerabilities assigned to me**.
+ **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > APM & services > (select an entity) > Triage > Vulnerability Management > Vulnerabilities**, click on Manage Security Notifications.
-This screen shows you all the vulnerabilities assigned to you. Select a vulnerability for detailed information about its impact and steps to remediation.
-
-## Set up vulnerability alerts [#alerts-setup]
+
-Set up through Slack or a Webhook to receive notifications when vulnerabilities of a set severity appear.
+
+ **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > APM & services > (select an entity) > Triage > Vulnerability Management > Vulnerabilities > Manage Security Notifications**.
+
### Set up a Slack alert [#slack-alerts]
-1. On any vulnerability management screen, select **Manage security notifications**
-2. Select **Add a Slack**.
-3. Under **Slack settings**, select a destination or create one by clicking .
-4. Under **Slack settings**, select a channel to send your notifications to.
-5. Under **Notification rules**, configure rules to receive notifications for vulnerabilities of different severity levels.
+1. Select **Add a Slack**.
+
+2. Under **Slack settings**, select a destination or create one by clicking .
+3. Under **Slack settings**, select a channel to send your notifications to.
+4. Under **Notification rules**, configure rules to receive notifications for vulnerabilities of different severity levels.
### Set up a webhook alert [#webhook-alerts]
-1. On any vulnerability management screen, select **Manage security notifications**.
-2. Select **Add a Webhook**.
-3. Under **Webhook settings**, select a destination or create one by clicking . Learn more about creating a Webhook destination [here](/docs/alerts-applied-intelligence/notifications/notification-integrations/#webhook).
-4. Under **Webhook settings**, create a channel name.
-5. Under **Notification rules**, configure rules to receive notifications for vulnerabilities of different severity levels.
+1. Select **Add a Webhook**.
+
+2. Under **Webhook settings**, select a destination or create one by clicking . Learn more about creating a webhook destination [here](/docs/alerts-applied-intelligence/notifications/notification-integrations/#webhook).
+3. Under **Webhook settings**, create a channel name.
+4. Under **Notification rules**, configure rules to receive notifications for vulnerabilities of different severity levels.
diff --git a/src/content/docs/vulnerability-management/overview.mdx b/src/content/docs/vulnerability-management/overview.mdx
index 4dd4dc025fa..24b34108dc1 100644
--- a/src/content/docs/vulnerability-management/overview.mdx
+++ b/src/content/docs/vulnerability-management/overview.mdx
@@ -24,7 +24,7 @@ Vulnerability Management provides a birds-eye view of all your software's vulner
* Identify the most urgent vulnerabilities
* Calculate the vulnerability surface area of your software
-* Triage and assign vulnerabilities to users with explicit remediation steps provided
+* Triage, prioritize, and remediate vulnerabilities with steps provided
[Visit one.newrelic.com](https://one.newrelic.com/vulnerability-management) to get started today.
@@ -57,7 +57,6 @@ Our Vulnerability Management capability provides functionality for developers, s
* Calculate the vulnerability surface area of your software systems
* Understand how runtime architecture of each application affects business risk, vulnerability and severity
- * Assign security tasks to individual developers
- Clicking into a specific library provides a detailed view of that library including the number of services using the library, the number of services impacted by CVEs, and details about specific CVEs.
+ Upon clicking a library, it provides you with list of all library versions currently in use as well as a tab which displays all the vulnerabilties detected due to the library.
**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Libraries**, click a library
+
+
+
+
+ **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Libraries**, click on detected vulnerabilities
+
+
+ Upon clicking a library version, it provides you with list of affected entities and vulnerabilties detected due to this library version.
+
+
+
+
+ **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Libraries**, click on specific library version
+
+
+
+
+
+ **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Libraries**, click on detected vulnerabilities
+
+
- From the Vulnerability Management **Summary** page, select **Vulnerabilities** to review all the vulnerabilities in your software system. This view shows every vulnerability, their source, number of impacted entities, and when they were first and last seen.
+ From the **Vulnerability Management Summary** page, select **Vulnerabilities** to review all the vulnerabilities in your software system. This view shows every vulnerability, priority rank, reason for prioritizing it, number of entities affected, detected by and much more.
This view is especially useful when responding to a specific vulnerability found in specific versions of libraries. Instead of reviewing each service to see if it's impacted, this view condenses info based on vulnerability instead of entity or library.
@@ -111,17 +143,5 @@ Dig deeper into the security of your system by auditing the vulnerability of all
**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Vulnerabilities**
-
- Once you've identified the entities impacted by a specific vulnerability, you can assign the remediation of that vulnerability in a specific entity to a user. This helps you organize large scale remediation between multiple teams and ownership structures.
-
-
-
-
- **[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > Vulnerabilities**, click a vulnerability to assign it.
-
diff --git a/src/content/docs/vulnerability-management/understanding-prioritization.mdx b/src/content/docs/vulnerability-management/understanding-prioritization.mdx
index a28115de185..cdf8364b671 100644
--- a/src/content/docs/vulnerability-management/understanding-prioritization.mdx
+++ b/src/content/docs/vulnerability-management/understanding-prioritization.mdx
@@ -23,7 +23,7 @@ This document covers:
-The priority ranking is based on all known data about a vulnerability. The **Reason to prioritize** column is a summary and weighting of key CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), IAST confirmed findings, and known active ransomware data.
+The priority ranking is based on all known data about a vulnerability. The **Reason to prioritize** column is a summary and weighting of key CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System) and known active ransomware data.
## Data influencing priority rank
@@ -173,14 +173,6 @@ The priority ranking is based on all known data about a vulnerability. The **Rea
-
-
- **IAST confirmed** are vulnerabilities found in your custom code that are confirmed to actually be exploitable even if threat actors may not be aware of the exploit.
-
### Example of ranking logic
diff --git a/static/images/cve-detail.webp b/static/images/cve-detail.webp
index 039d6b3d120..36eb8a8f103 100644
Binary files a/static/images/cve-detail.webp and b/static/images/cve-detail.webp differ
diff --git a/static/images/security_screenshot-affected-bulk-details.webp b/static/images/security_screenshot-affected-bulk-details.webp
index 4003998c485..ff31baff9d9 100644
Binary files a/static/images/security_screenshot-affected-bulk-details.webp and b/static/images/security_screenshot-affected-bulk-details.webp differ
diff --git a/static/images/security_screenshot-affected-bulk-form.webp b/static/images/security_screenshot-affected-bulk-form.webp
index 45d7801471c..537fe5bc17f 100644
Binary files a/static/images/security_screenshot-affected-bulk-form.webp and b/static/images/security_screenshot-affected-bulk-form.webp differ
diff --git a/static/images/security_screenshot-affected-bulk-selection.webp b/static/images/security_screenshot-affected-bulk-selection.webp
index 0efbd13b192..213a6d7bf81 100644
Binary files a/static/images/security_screenshot-affected-bulk-selection.webp and b/static/images/security_screenshot-affected-bulk-selection.webp differ
diff --git a/static/images/security_screenshot-affected-bulk-vulnlist.webp b/static/images/security_screenshot-affected-bulk-vulnlist.webp
index e2e02e6b8ec..0727db47510 100644
Binary files a/static/images/security_screenshot-affected-bulk-vulnlist.webp and b/static/images/security_screenshot-affected-bulk-vulnlist.webp differ
diff --git a/static/images/security_screenshot-affected-entity-details.webp b/static/images/security_screenshot-affected-entity-details.webp
index 5b5679a4fed..6ef9c864a15 100644
Binary files a/static/images/security_screenshot-affected-entity-details.webp and b/static/images/security_screenshot-affected-entity-details.webp differ
diff --git a/static/images/security_screenshot-affected-entity-form.webp b/static/images/security_screenshot-affected-entity-form.webp
index d89b3c3aa7c..c6f0103a783 100644
Binary files a/static/images/security_screenshot-affected-entity-form.webp and b/static/images/security_screenshot-affected-entity-form.webp differ
diff --git a/static/images/security_screenshot-affected-entity-vulnlist.webp b/static/images/security_screenshot-affected-entity-vulnlist.webp
index 57f5aab4793..3caebfb3858 100644
Binary files a/static/images/security_screenshot-affected-entity-vulnlist.webp and b/static/images/security_screenshot-affected-entity-vulnlist.webp differ
diff --git a/static/images/security_screenshot-detected-vuln-all-lib-versions.webp b/static/images/security_screenshot-detected-vuln-all-lib-versions.webp
new file mode 100644
index 00000000000..8f7b50b0bfb
Binary files /dev/null and b/static/images/security_screenshot-detected-vuln-all-lib-versions.webp differ
diff --git a/static/images/security_screenshot-detected-vuln-specific-lib-version.webp b/static/images/security_screenshot-detected-vuln-specific-lib-version.webp
new file mode 100644
index 00000000000..6d27ee785ca
Binary files /dev/null and b/static/images/security_screenshot-detected-vuln-specific-lib-version.webp differ
diff --git a/static/images/security_screenshot-entity_security-overview.webp b/static/images/security_screenshot-entity_security-overview.webp
new file mode 100644
index 00000000000..f87dd926a45
Binary files /dev/null and b/static/images/security_screenshot-entity_security-overview.webp differ
diff --git a/static/images/security_screenshot-full_security-overview.webp b/static/images/security_screenshot-full_security-overview.webp
index 6dfe91a4bc0..1b1bdab91d0 100644
Binary files a/static/images/security_screenshot-full_security-overview.webp and b/static/images/security_screenshot-full_security-overview.webp differ
diff --git a/static/images/security_screenshot-ignore-bulk-details.webp b/static/images/security_screenshot-ignore-bulk-details.webp
index 6331b1539a1..11018681c9f 100644
Binary files a/static/images/security_screenshot-ignore-bulk-details.webp and b/static/images/security_screenshot-ignore-bulk-details.webp differ
diff --git a/static/images/security_screenshot-ignore-bulk-form.webp b/static/images/security_screenshot-ignore-bulk-form.webp
index 6a8c3585366..c2c44c7d0e9 100644
Binary files a/static/images/security_screenshot-ignore-bulk-form.webp and b/static/images/security_screenshot-ignore-bulk-form.webp differ
diff --git a/static/images/security_screenshot-ignore-bulk-vulnlist.webp b/static/images/security_screenshot-ignore-bulk-vulnlist.webp
index 2c67c5fd83a..6153334f145 100644
Binary files a/static/images/security_screenshot-ignore-bulk-vulnlist.webp and b/static/images/security_screenshot-ignore-bulk-vulnlist.webp differ
diff --git a/static/images/security_screenshot-ignore-entity-details.webp b/static/images/security_screenshot-ignore-entity-details.webp
index 219dea1d0f8..c90d93b2e52 100644
Binary files a/static/images/security_screenshot-ignore-entity-details.webp and b/static/images/security_screenshot-ignore-entity-details.webp differ
diff --git a/static/images/security_screenshot-ignore-entity-form.webp b/static/images/security_screenshot-ignore-entity-form.webp
index 9a4d07dff31..5d6ce0a0a07 100644
Binary files a/static/images/security_screenshot-ignore-entity-form.webp and b/static/images/security_screenshot-ignore-entity-form.webp differ
diff --git a/static/images/security_screenshot-ignore-entity-vulnlist.webp b/static/images/security_screenshot-ignore-entity-vulnlist.webp
index 399c0a2395a..0811007144b 100644
Binary files a/static/images/security_screenshot-ignore-entity-vulnlist.webp and b/static/images/security_screenshot-ignore-entity-vulnlist.webp differ
diff --git a/static/images/security_screenshot-library-versions.webp b/static/images/security_screenshot-library-versions.webp
new file mode 100644
index 00000000000..b81eac9d834
Binary files /dev/null and b/static/images/security_screenshot-library-versions.webp differ
diff --git a/static/images/security_screenshot-manage-notifications.webp b/static/images/security_screenshot-manage-notifications.webp
new file mode 100644
index 00000000000..9841ce08d3e
Binary files /dev/null and b/static/images/security_screenshot-manage-notifications.webp differ
diff --git a/static/images/security_screenshot-notification-rules.webp b/static/images/security_screenshot-notification-rules.webp
new file mode 100644
index 00000000000..b462ea70c04
Binary files /dev/null and b/static/images/security_screenshot-notification-rules.webp differ
diff --git a/static/images/security_screenshot-slack-rule.webp b/static/images/security_screenshot-slack-rule.webp
new file mode 100644
index 00000000000..05639fe718c
Binary files /dev/null and b/static/images/security_screenshot-slack-rule.webp differ
diff --git a/static/images/security_screenshot-vm-affected-entities-specific-lib-version.webp b/static/images/security_screenshot-vm-affected-entities-specific-lib-version.webp
new file mode 100644
index 00000000000..1f8273c8848
Binary files /dev/null and b/static/images/security_screenshot-vm-affected-entities-specific-lib-version.webp differ
diff --git a/static/images/security_screenshot-webhook-rule.webp b/static/images/security_screenshot-webhook-rule.webp
new file mode 100644
index 00000000000..1fefb83a6d3
Binary files /dev/null and b/static/images/security_screenshot-webhook-rule.webp differ
diff --git a/static/images/vmVulnTab.webp b/static/images/vmVulnTab.webp
index 9c84f7f606b..bc4293b5991 100644
Binary files a/static/images/vmVulnTab.webp and b/static/images/vmVulnTab.webp differ
diff --git a/static/images/vuln-entity-security.webp b/static/images/vuln-entity-security.webp
index e039d9df0e3..96710896274 100644
Binary files a/static/images/vuln-entity-security.webp and b/static/images/vuln-entity-security.webp differ
diff --git a/static/images/vuln-libraries.webp b/static/images/vuln-libraries.webp
index 34002ae8163..b1bbcf2391c 100644
Binary files a/static/images/vuln-libraries.webp and b/static/images/vuln-libraries.webp differ
diff --git a/static/images/vuln-priority-security.webp b/static/images/vuln-priority-security.webp
index d32a622f67a..60cd0912d0c 100644
Binary files a/static/images/vuln-priority-security.webp and b/static/images/vuln-priority-security.webp differ
diff --git a/static/images/vulnLibrary.webp b/static/images/vulnLibrary.webp
index 5c115da7b3c..4670841ef68 100644
Binary files a/static/images/vulnLibrary.webp and b/static/images/vulnLibrary.webp differ