Date: 2026-02-19
Turn vulnerability operations from "finding overload" into a weekly execution loop:
- ingest findings,
- prioritize with context,
- create/route work,
- track closure and SLA,
- explain decisions.
- Buyer/user: security lead, sysadmin lead, or VM analyst at understaffed orgs.
- Existing tools stay in place (scanner + ticketing + Slack); KRS is orchestration/decision layer.
- Early success metric: less triage time + faster remediation on exploitable/high-impact items.
[Scanners: Nessus/Qualys/Rapid7/Defender/SCA]
|
v
[Ingestion Connectors] -----> [Normalizer + Deduper]
|
v
[Risk Fusion Engine]
(CVSS + KEV + EPSS + Asset Criticality + Exposure)
|
v
[Decision Orchestrator]
(Fix now / Schedule / Accept / Investigate)
| | |
v v v
[Ticketing] [Slack] [Analyst UI/API]
(Jira/ServiceNow) (alerts/digest) (override/audit)
\ | /
\ v /
---> [Evidence + Audit Store] <---
|
v
[Metrics/Reporting]
(MTTR, overdue KEV, backlog burn)
-
Connector Service
- Pulls findings/assets from scanner APIs or file uploads.
- Handles incremental sync and source health.
-
Normalization Service
- Canonical finding model (CVE, asset, package, version, exposure state).
- Dedupes cross-scanner duplicates.
-
Risk Fusion Service
- Computes
priority_scoreanddecision_reason. - Inputs: KEV, EPSS, exploit intel, business criticality, internet exposure, compensating controls.
- Computes
-
Agent Orchestrator
- Runs triage agents with guardrails.
- Emits explicit confidence + required follow-up when uncertain.
-
Workflow Service
- Creates/updates Jira/ServiceNow tickets.
- Manages ownership mapping, SLA timers, escalations.
-
Comms Service
- Slack digest, urgent pings, escalation chains.
-
Audit & Policy Service
- Immutable decision log and policy versioning.
- Supports compliance and post-incident review.
-
API/UI Service
- Queue view, override workflow, search, and evidence drill-down.
Findingfinding_id,source,cve,asset_id,detected_at,status
Assetasset_id,owner,criticality,internet_exposed,environment
RiskAssessmentfinding_id,score,decision(FIX_NOW|SCHEDULE|ACCEPT|INVESTIGATE),confidence,reason
WorkItemticket_id,system(jira|servicenow),owner,due_date,state
Evidencefinding_id,inputs_snapshot,policy_version,agent_trace_ref
FindingIngestedRiskRecomputedDecisionIssuedWorkItemCreatedWorkItemStateChangedSlaBreached
- Least-privilege per connector integration token
- Tenant isolation per workspace/org
- Prompt-injection-safe ingestion (treat external text as untrusted)
- Signed policy versions for decision logic
- Full audit trail of automated decisions + human overrides
- Cross-tenant data leakage
- Ticket spoofing / unauthorized updates
- Agent prompt injection via scanner metadata
- Sensitive asset labels exposed in Slack/public channels
- API key exfiltration from connector workers
- Unsafe auto-remediation actions (MVP should be recommendation-first)
- Connector sync SLO: 99.5% daily completion
- Decision pipeline latency target: <10 min from ingest to decision (MVP)
- Idempotent ticket creation/update
- Dead-letter queues for failed ingestion/dispatch
- Tracing across ingest -> score -> ticket -> notification
- Golden metrics:
- triage cycle time
- high-risk overdue count
- MTTR for KEV-tagged findings
- false-positive override rate
- CSV/scanner export ingestion
- KEV+EPSS+criticality ranking
- Manual Slack digest
- Goal: prove ranking usefulness with 3-5 design partners
- One scanner connector + Jira integration + Slack
- Decision queue with evidence
- SLA timer + escalation
- Basic audit log
- Multi-scanner dedup
- ServiceNow support
- Policy editor + approval workflow
- Reporting dashboard (burn-down, MTTR, risk trend)
- Reachability/runtime exploitability inputs
- Multi-tenant MSP mode
- Optional safe auto-remediation playbooks
- What is the first mandatory scanner integration for design partners?
- Jira vs ServiceNow first: which gives fastest proof of value?
- Is asset criticality available via CMDB, or do we bootstrap manually?
- What confidence threshold allows auto-ticketing without analyst review?
- What escalation policy is acceptable outside business hours?
## Decision D-00X
- Date:
- Owner:
- Context:
- Options considered:
- Decision:
- Consequences:
- Review date:- Recruit 3 design partners matching primary personas (small security team, high backlog).
- Finalize canonical finding schema and scoring formula v0.1.
- Implement ingestion adapter for first scanner source.
- Implement Jira ticketing + Slack digest loop.
- Run one-week shadow mode against real backlog; compare KRS ranking vs team baseline.
- Publish outcome metrics (time saved, missed-high-risk reduction) for go/no-go on v1.