💡 Still using the classic Drata experience? Refer to Vulnerabilities for the original UI.
The Vulnerabilities page centralizes security vulnerabilities discovered across your connected tools. It helps you prioritize remediation, track SLA deadlines, and monitor compliance status in one place.
Drata uses vulnerability data to support audit readiness, SLA enforcement, and monitoring tests tied to your security controls.
How vulnerability tracking works in Drata
When you connect a supported vulnerability scanning or exposure management tool:
Drata continuously syncs vulnerability findings
Each vulnerability is assigned an SLA due date based on severity
Status updates reflect the latest data from the source system
Monitoring tests evaluate whether critical and high vulnerabilities are addressed
Drata does not remediate vulnerabilities. It tracks status, deadlines, and compliance impact.
Before you begin
Connect at least one supported vulnerability provider. Supported connections include:
Arnica
Aikido
AWS Inspector
CrowdStrike Falcon Exposure Management
Microsoft Defender Vulnerability Management
Orca
Qualys
Rapid7 InsightVM
Semgrep
SentinelOne Singularity Vulnerability Management
Snyk
Tenable Vulnerability Management
Wiz Code
Zoho Desk
View vulnerabilities
To open the Vulnerabilities page:
Select Risk > Vulnerabilities from the left navigation.
From this page, you can:
Filter vulnerabilities by connection, severity, due date, or fix availability
Search by vulnerability ID
View SLA due dates and current status
Download vulnerability reports (filtered or complete)
Resync data using Resync
View vulnerability details
Select a vulnerability to its specific details such as:
CVSS score
Severity
SLA due date
Status
Platform-specific metadata from the source tool
SLA behavior and due dates
Drata calculates SLA due dates based on vulnerability severity.
Default SLAs
If no Vulnerability Management Policy is configured, Drata applies default SLAs:
Critical: 7 days
High: 30 days
Medium: 90 days
Low: 180 days
If a Vulnerability Management Policy exists, Drata uses the SLAs defined in that policy instead. SLA due dates appear in the SLA Due Date column on the Vulnerabilities page.
Configure SLA settings and warning periods
To update SLA and warning period settings:
Navigate to Risk > Vulnerabilities settings:
In the SLA Settings:
Edit SLA values by severity
Set a warning period for upcoming SLA deadlines
The warning period determines when you receive notifications before an SLA is due.
Example:
If the warning period is set to 7 days, Drata sends notifications 7 days before each SLA due date.
Schedule vulnerability notifications
To receive email notifications for missed or upcoming SLAs:
Open Settings.
Select Notifications.
Enable Reminders for vulnerabilities with missed or upcoming SLAs.
Select how often you want to receive notifications.
Notifications include summaries of critical and high-severity vulnerabilities, along with due dates.
Monitoring tests
For each connected provider, Drata creates the following monitoring tests:
Critical Vulnerabilities Addressed – <Provider Name>
Fails if one or more critical vulnerabilities remain open.High Vulnerabilities Addressed – <Provider Name>
Fails if one or more high-severity vulnerabilities remain open.
These tests help ensure timely remediation and support audit evidence.
Key distinction to remember
Drata tracks and evaluates vulnerabilities, but remediation happens in your connected tools. Keeping SLAs accurate, connections active, and vulnerabilities resolved ensures:
Monitoring tests pass
SLA commitments are met
Audit evidence remains defensible
