Platform Guide

Asset Topology Diagram

The Asset Topology Diagram gives you a unified network view of discovered assets and their correlated security context.

It combines:

  1. 1Discovered topology relationships
  2. 2Open-port evidence
  3. 3Fingerprint summaries
  4. 4CyfroAI insight highlights
  5. 5Ranked risk context

Accessing the Topology View

The page loads topology data for the currently selected account group.

If no topology data exists yet, the page shows an empty state with guidance to run discovery/scanning first.

Desktop Experience

On desktop, topology renders as an interactive workspace with:

  1. 1Toolbar and filters
  2. 2Interactive graph canvas
  3. 3Integrated asset detail drawer

Toolbar Summary Chips

The top summary row shows current snapshot counts:

  1. 1Assets
  2. 2Subnets
  3. 3Ports
  4. 4Fingerprint
  5. 5CyfroAI Insights
  6. 6Critical

It also shows the snapshot generation timestamp and a Refresh action.

Filters

The filter toolbar supports:

  1. 1Search (IP, hostname, service, CVE, vendor, AI text)
  2. 2Subnet selector
  3. 3Risk only toggle
  4. 4Time window selector (7d, 14d, 30d, 90d)

Graph Controls

The canvas includes:

  1. 1Fit (fit graph to viewport)
  2. 2Reflow (re-run layout)
  3. 3Zoom controls
  4. 4Fullscreen toggle

Asset Detail Panel

Selecting an asset opens a detail panel with structured sections:

  1. 1Asset metadata
  2. 2Port Evidence
  3. 3Fingerprint Summary
  4. 4AI Insights
  5. 5Top Risks
  6. 6Correlation Notes

Port Evidence

Shows correlated service observations such as:

  1. 1Port/protocol
  2. 2Service or product hints
  3. 3State and severity context

Fingerprint Summary

Shows fingerprint correlation details including:

  1. 1Target identity
  2. 2Highest severity
  3. 3Vulnerability count
  4. 4Misconfiguration/secret counts

AI Insights

Shows asset-linked AI summaries with:

  1. 1Source type
  2. 2Timestamp
  3. 3Highest risk badge
  4. 4Short summary lines

The panel includes a direct link to the full AI page for deeper review.

Top Risks

Lists prioritized risks with:

  1. 1Title
  2. 2Vulnerability/package/target context
  3. 3Effective risk level
  4. 4AI-provided reasoning

Correlation Behavior

CyfroSec uses conservative correlation rules. Evidence is attached to an asset only when identity mapping is reliable.

If a finding cannot be safely matched, it is kept separate from direct asset attribution to avoid false linkage.

Examples that commonly require additional context:

  1. 1Generic or filesystem fingerprint targets
  2. 2Scan artifacts without host identity metadata
  3. 3Ambiguous multi-host correlation paths