In the lab ‘Attack Detection and Prevention’, you detected the vulnerability in your environment and then observed that the policy blocked the Attack that leverages a particular vulnerability. You made sure the policy worked as expected. You have done this step well and bought your DevOps and SecOps teams valuable time to plan and implement a permanent remediation method.
In this lab you will:
Use the steps below to navigate to your TeaStore application.

Check the current Business Risk Score for your application, and navigate to Cisco Secure Application to check the risk for specific Business Transactions.

Use the Business Transactions security dashboard to identify the transactions that are associated with the highest business risk.
The Daily Highest Business Risk Score Detected shows the Business Risk Score together with the thresholds.
Use the search bar and start typing in cartAction. Select the available cartAction business transaction.
Click the name of the business transaction.

Examine the security state of the selected business transaction.
The Details section on the left displays the Business Risk Factors that make up the Risk Score. The Business Risk Score is composed of several factors related to the business transaction:
In the list below the details you will find all the vulnerabilities that are currently present in the business transaction
Select the API Findings tab

Investigate which potentially vulnerable third-party API integrations the business transaction uses.

See all occurrences of the API vulnerability, the endpoints affected, and the description of each issue.

With Business Risk Observability (BRO) features, you have learned to focus on the security issues that have the greatest impact on your business.
In this exercise, you learned how to examine a business transaction for security issues and how to focus on the issues that pose the greatest Business Risk to your organization. You also learned how to examine the security details of business transactions and the associated vulnerabilities that may stem from the libraries used or the third-party APIs called by the application. The features you learned in this lab can help your DevOps and AppSec team immensely in deciding where to start and how to prioritize remediation efforts based on the associated business risk.
Well done again! It was a quick lab but you now have the information for your teams so they can prioritize their remediation efforts.
You will take a look at how you can use Cisco Secure Application for Vulnerability Assessment & Remediation.