← Back to Home
← Back to Home
🔍 EDGAR Scanner Architecture
Network Asset Discovery & Vulnerability Scanning Integration
System Overview
EDGAR Scanner is a network asset discovery and vulnerability scanning tool integrated with EDD-i. It supports SSH, WinRM, and nmap with encrypted credential storage and comprehensive CVE reporting.
Core Capabilities
- Multi-protocol network scanning (SSH, WinRM, nmap)
- Asset inventory discovery and classification
- Vulnerability assessment with CVE correlation
- Service enumeration and version detection
- Encrypted credential management
- Scheduled periodic scans
- Real-time integration with EDD-i dashboard
Technology Stack
Core Tools
- Python 3.10+
- nmap
- OpenSSH
- WinRM/WSMan
- Paramiko (SSH)
Data Processing
- NVD API Integration
- CVE Database
- CVSS Scoring
- Service Detection
- Version Matching
Security
- AES Encryption
- Credential Vault
- TLS/SSL
- API Rate Limiting
- Audit Logging
Integration
- REST API
- PostgreSQL
- Redis Queue
- WebHooks
- EDD-i Integration
Scanning Capabilities
Protocol Support
- SSH Scanning - Linux/Unix server assessment
- WinRM Scanning - Windows system vulnerability detection
- nmap Scanning - Network service enumeration and port discovery
- Custom Protocols - Extensible architecture for additional protocols
Asset Discovery
- Network range scanning with CIDR notation
- Host detection and identification
- Service port enumeration
- Operating system detection
- Application version identification
Vulnerability Detection
- Package vulnerability scanning
- NVD CVE correlation
- CVSS severity rating
- Exploit availability tracking
- Patch availability detection
Architecture Components
Scanner Engine
- Modular protocol handlers
- Parallel scan execution
- Timeout and retry logic
- Progress tracking and reporting
Credential Management
- Encrypted vault with master key
- Per-credential audit logging
- Automatic key rotation support
- Role-based credential access
Data Processing
- NVD database synchronization
- CVE matching algorithms
- CVSS calculation
- Deduplication logic
Reporting
- Real-time dashboard updates
- Historical vulnerability tracking
- Executive summary reports
- Technical detailed reports
Performance Specifications
- Network scan speed: 1000+ hosts per minute
- Service detection: <500ms per host
- CVE correlation: <1 second per vulnerability
- Dashboard update latency: <2 seconds
- Concurrent scans: 100+ simultaneous target ranges
Integration with EDD-i
- Automatic evidence extraction for compliance controls
- Real-time vulnerability feed to dashboard
- FAIR risk model integration
- Remediation recommendation context