| Vulnerability |
The vulnerability is an unintended characteristic of a computing component or |
yes |
| Group |
The Group object represents a collection or association of entities, such as |
yes |
| Databucket |
The databucket object is a basic container that holds data, typically organiz... |
yes |
| WebResource |
The Web Resource object describes characteristics of a web resource that was |
yes |
| FindingObject |
The Finding object describes metadata related to a security finding generated |
yes |
| IncidentFinding |
An Incident Finding reports the creation, update, or closure of security |
yes |
| Table |
The table object represents a table within a structured relational database o... |
yes |
| Node |
Represents a node or a vertex in a graph structure |
yes |
| FindingInfo |
The Finding Information object describes metadata related to a security findi... |
yes |
| File |
The File object represents the metadata associated with a file stored in a |
yes |
| Database |
The database object is used for databases which are typically datastore |
yes |
| Osint |
The OSINT (Open Source Intelligence) object contains details related to an |
yes |
| Check |
The check object defines a specific, testable compliance verification point |
yes |
| Remediation |
The Remediation object describes the recommended remediation steps to address |
yes |
| CisBenchmark |
The CIS Benchmark object describes best practices for securely configuring IT |
yes |
| Analytic |
The Analytic object contains details about the analytic technique used to |
yes |
| Location |
The Geo Location object describes a geographical location, usually associated |
yes |
| Advisory |
The Advisory object represents publicly disclosed cybersecurity vulnerabiliti... |
yes |
| CisBenchmarkResult |
The CIS Benchmark Result object contains information as defined by the Center |
yes |
| ApplicationObject |
An Application describes the details for an inventoried application as report... |
yes |
| Policy |
The Policy object describes the policies that are applicable |
yes |
| Job |
The Job object provides information about a scheduled job or task, including |
yes |
| UnmannedSystemOperatingArea |
The Unmanned System Operating Area object describes details about a precise |
no |
| Cve |
The Common Vulnerabilities and Exposures (CVE) object represents publicly |
yes |
| Rule |
The Rule object describes characteristics of a rule associated with a policy ... |
yes |
| Device |
The Device object represents an addressable computer system or host, which is |
yes |
| Enrichment |
The Enrichment object provides inline enrichment data for specific attributes |
yes |
| FirewallRule |
The Firewall Rule object represents a specific rule within a firewall policy ... |
no |
| Graph |
A graph data structure representation with nodes and edges |
yes |
| CisControl |
The CIS Control (aka Critical Security Control) object describes a prioritize... |
yes |
| Compliance |
The Compliance object contains information about Industry and Regulatory |
yes |
| RelatedEvent |
The Related Event object describes an event or another finding related to a |
yes |
| Assessment |
The Assessment object describes a point-in-time assessment, check, or |
yes |