Qualys Enterprise TruRisk Platform (VMDR)
Limited Customer Release Notes
Version 2.2.0
March 17, 2025
What is Risk Acceptance Rules
Accepting risks from vulnerability findings means making a conscious decision to recognize and tolerate certain vulnerabilities without addressing them right away. There may be several reasons for this inaction, such as a lack of available downtime, the absence of a patch, or the incompatibility of applications with new updates.
This approach is usually taken when the cost of mitigation is greater than the potential impact of a vulnerability or when the risk is within the organization’s acceptable risk tolerance level.
After consulting with internal stakeholders, you may categorize certain vulnerabilities as false positives or conclude that specific findings cannot be addressed.
Documenting accepted risks and assigning responsibility for regular monitoring and reassessment is crucial.
What are the benefits of accepting risk
Following are the benefits:
- Resource Optimization: Focus resources on higher-priority vulnerabilities.
- Strategic Alignment: Align risk acceptance with business goals and risk appetite.
Steps to Create a Risk Acceptance Rule
You can create this rule from the Responses tab.
Go to the Responses tab > Risk Acceptance Rules > Create Rules.
Step 1: Enter Basic Details
A Risk Acceptance Rule allows you to acknowledge certain vulnerability risks without immediately remediating them. This may be due to effective mitigation controls or an internal agreement classifying the vulnerabilities as accepted risks or false positives.
Start by providing rule information and setting the exception duration, which defines the period during which the risk is accepted.
Field Name | Description |
Rule Information |
Enter a rule name and description. Rule Name is required. |
Exception Duration |
Define the time period during which a risk acceptance rule remains in effect or how long specific vulnerabilities or findings are excluded from remediation and TruRisk calculation. Once the exception period expires, the previously exempted findings may be flagged again for review or remediation. |
Step 2: Define Scope
Enter QQL queries to define the scope of the acceptance rule and validate your query.
Vulnerability queries are mandatory.
Queries for Defining Scope
You can only use a limited set of queries, as listed below, to define your scope.
Asset | Vulnerability | RiskFactor |
interfaces.address interfaces.hostname netbiosName agent.agentID operatingSystem tracking method criticalityScore riskScore aws.ec2.instanceId azure.vm.vmId |
vulnerabilities.vulnerability.qid vulnerabilities.typeDetected vulnerabilities.port vulnerabilities.hostOS vulnerabilities.protocol vulnerabilities.severity vulnerabilities.status vulnerabilities.vulnerability.cveIds vulnerabilities.detectionScore vulnerabilities.nonRunningKernel vulnerabilities.nonExploitableConfig |
vulnerabilities.riskFactor.cisaKnownExploits vulnerabilities.riskFactor.threatActorName vulnerabilities.riskFactor.exploitType vulnerabilities.riskFactor.rti vulnerabilities.riskFactor.malwareName vulnerabilities.riskFactor.exploitCodeMaturity |
Step 3: Provide Reason for Exception
Explain why this risk is accepted or does not apply to your environment.
- If you choose Risk Accepted, you are acknowledging and accepting the risk, and it will be excluded from TruRisk calculations.
- If you choose False Positive, it means that although findings will be identified, they will be deemed irrelevant to the environment and excluded from TruRisk calculations.
Step 4: Define Expiry Notification Settings
Configure when and to whom expiry notifications should be sent.
Recipients: Provide the email addresses of recipients who should receive the notification.
Days Before Exception: Specify the number of days before expiry when the notification email should be sent.
After saving, review and confirm your configurations, then save again. Finally, acknowledge the selected exception.
Once created, the exception rule will appear on the Risk Acceptance Rule listing page.
A risk acceptance rule is applied only after a scan runs; it is not enforced immediately upon creation.
About Asset and Finding Inventory
The Assets and Finding fields provide an overview of the asset and finding inventory detected on your assets.
- Clicking an Asset Inventory redirects you to the Vulnerabilities > Assets page, where you can view the assets in your inventory.
- Clicking a Finding Inventory redirects you to the Vulnerabilities > Vulnerabilities page, where you can see the vulnerabilities detected on your assets.
In both cases, the vulnerabilities.riskAcceptanceId
is applied as a filter to display relevant assets or vulnerabilities.
Quick Action Menu
Using the Quick Action Menu that appears next to a rule on mouse hover, you can perform the following actions:
- View Details of the rule. This is read-only.
- Edit the rule.
Changes to a risk acceptance rule take effect 12 hours after editing, regardless of when the last scan was run.
- Delete the rule.
About Excluded Vulnerabilities Filter
The Excluded Vulnerabilities filter helps you identify and manage vulnerabilities intentionally omitted from reporting or remediation workflows. By deselecting the "Ignored - Risk Accepted" and "Ignored - False Positives" options in this filter, you can specifically view vulnerabilities your organization has previously classified as accepted risks or false positives.
Using these filter options, security teams can regularly review vulnerabilities that have been accepted as risks or marked as false positives, ensuring that these decisions remain valid over time.
New Tokens
The following table lists the new tokens introduced with this enhancement.
Token | Description |
vulnerabilities.riskAcceptance |
Use the token to indicate different statuses for how a vulnerability is being handled or categorized. You can choose from the following options: RISK_ACCEPTED, FALSE_POSITIVE Example Show vulnerabilities where associated risks have been accepted without immediate remediation. vulnerabilities.RiskAcceptance:RISK_ACCEPTED Show vulnerabilities that were identified as a false positive, meaning it does not exist or are incorrectly flagged vulnerabilities.RiskAcceptance:FALSE_POSITIVE |
vulnerabilities.riskAcceptanceId |
Use this token to see vulnerabilities associated with a unique identifier that links it to a corresponding risk acceptance record. Example Show vulnerabilities associated with RiskAcceptanceID 12345 vulnerabilities.RiskAcceptanceID:12345 |
Limitations
To ensure clarity and consistency, the following limitations apply when defining your scope using queries:
- Enablement Restrictions: This feature can only be activated if the Remediation Policy is not in use.
- Scope of Risk Acceptance: Risk acceptance is limited to the Vulnerability Management Detection and Response (VMDR) UI and is not supported in Vulnerability Management Reports or API.
- Restricted Query Set: Only the queries listed in this section can be used.
- Rule Application Timing: A risk acceptance rule is applied only after a scan runs and is not enforced immediately upon creation.
- Editing Rules: Changes to a risk acceptance rule take effect 12 hours after editing, regardless of the timing of the last scan.