Scanner guide16 min read

Scanner Finding Tag and Label Taxonomy

Every multi-scanner programme inherits a classification problem the moment the second tool ships output into the same findings record. Nessus emits plugin family strings, Burp Suite emits issue type identifiers, Semgrep emits rule identifiers tied to ruleset versions, SCA tools emit CWE identifiers against the upstream CVE, and CSV imports carry whatever the exporting team happened to put in the category column. Without a documented workspace taxonomy, the canonical category field quietly inherits whichever scanner happened to fire first, cross-engagement search returns inconsistent counts, the leadership rollup reads against a value list nobody owns, and the audit trail cannot reconstruct why a given finding sits under the category it carries.

This guide covers how to design a defensible vulnerability finding tag and label taxonomy, what axes carry the load (vulnerability class, impact dimension, asset class, exposure context, remediation owner), how the taxonomy differs from severity normalisation and finding deduplication, how to crosswalk the workspace classification to OWASP, CWE, and ASVS without pinning the internal scheme to an external version, how enforcement runs at finding creation, triage, and cross-engagement review, how to keep the value list from growing by accretion or drifting out of date, who should own the taxonomy and how often it should be reviewed, how compliance frameworks read the taxonomy as operating evidence, and how internal security, AppSec, vulnerability management, GRC, and security engineering teams operate a taxonomy as a workspace policy rather than as analyst memory.

Why scanner-emitted tags do not constitute a workspace taxonomy

Scanners ship their own classification systems because their vendors needed something to describe rules, plugins, and detections inside their own product context. Those classifications are vendor signals, not workspace decisions. Nessus organises plugins into families (Web Servers, CGI abuses, Misc., Backdoors); Burp Suite organises issues into types (cross-site scripting reflected, SQL injection, authentication bypass); Semgrep organises rules into rulesets keyed to language, framework, and policy; CodeQL ships query suites tied to query packs; SCA tools emit the CWE the upstream CVE was assigned to; cloud configuration scanners emit control identifiers against the cloud provider taxonomy.

None of these vendor taxonomies match the way the workspace actually answers the questions the programme reads at standup, at leadership review, at audit fieldwork. How many access-control findings are open this quarter? How many cryptography findings landed in the last release cycle? How many supply chain findings are owned by platform engineering? How many findings on customer-facing applications need remediation before the next compliance evidence window? Each of these questions requires a category the workspace defines, not a category the scanner happened to ship.

The structural reason matters. A vendor taxonomy is optimised for the vendor product: the granularity reflects what the vendor wants to talk to customers about, not what customers need to talk to leadership and auditors about. The classification axes reflect the vendor scanning model, not the workspace asset model, the remediation ownership model, or the compliance crosswalk model. A workspace that propagates vendor tags into canonical fields inherits a different taxonomy per scanner and a backlog where the same logical vulnerability lands under five different category strings depending on which tool fired first.1,2,5,15

The five axes a defensible workspace taxonomy classifies along

Five axes carry the operational load in mature programmes. Each axis answers a different question, each carries a closed value list, and each finding carries exactly one value per axis where the axis applies.

AxisQuestion it answersExample closed list values
Vulnerability classWhat technical category does the finding belong to?injection, access-control, authentication, authorisation, cryptography, configuration, information-disclosure, business-logic, supply-chain, llm-specific
Impact dimensionWhat does the vulnerability let an attacker do?data-confidentiality, data-integrity, system-availability, account-takeover, privilege-escalation, lateral-movement
Asset classWhat kind of target does the finding live on?external-web-app, internal-app, api-endpoint, mobile-app, repository, container-image, cloud-resource, network-service, llm-endpoint
Exposure contextHow does the asset sit relative to the threat surface?internet-facing, internal-only, partner-facing, employee-facing, customer-facing
Remediation ownerWhich team is accountable for closing the finding?appsec, platform-engineering, cloud-security, vulnerability-management, product-team-name, security-engineering

The five axes are independent: a SQL injection finding (vulnerability class) on an internet-facing customer-facing web application (asset class, exposure context) with data confidentiality and data integrity impact (impact dimension) owned by the AppSec team (remediation owner) reads cleanly across all five axes without forcing any one of them to carry information that belongs to another. Programmes that conflate axes (using vulnerability class to also encode asset class or remediation owner) produce value lists that grow by combinatorial accretion and that nobody can keep consistent.4,5,7,8,14

Taxonomy versus severity, deduplication, and asset binding

The taxonomy is one of four classification disciplines a multi-scanner workspace runs. It is easier to design each one cleanly when the boundaries between them are named.

  • Deduplication answers whether two records describe the same underlying vulnerability and how to collapse them without losing evidence. The scanner output deduplication guide covers the merge mechanics.
  • Severity normalisation answers what numeric severity the canonical record carries once the records are collapsed. The scanner output severity normalisation guide covers the translation table.
  • Asset binding answers which durable asset the finding lives on. The scanner finding to asset binding guide covers the foreign-key model and the orphaned-finding queue.
  • Tag and label taxonomy answers which structured classification axes the canonical record sits under for search, routing, reporting, and audit. This guide covers the discipline.
  • Routing and owner assignment answers who owns each finding given the taxonomy value, the asset binding, the severity, and the engagement scope. The scanner finding routing and owner assignment guide covers the six routing inputs the rule reads, the recurring-detection assignment inheritance, and the unowned-finding controlled queue.

The four disciplines reinforce each other but do not substitute for each other. A programme that operates strong deduplication and severity normalisation without a taxonomy still produces a backlog that cannot answer how many findings of a class are open against an asset class right now. A programme that operates a taxonomy without strong deduplication produces a backlog where the same logical vulnerability sits under three records with three classifications. The defensible operating model is all four disciplines as parallel workstreams with named owners and documented policies, not one substituting for another.

Anchoring the workspace taxonomy against external schemes

External taxonomies are useful as crosswalks, not as the canonical workspace scheme. OWASP Top 10 revises on a roughly four-year cadence (2017, 2021, expected 2025 or later); the LLM Top 10 revises faster (2023, 2025); CWE adds entries and merges entries continually; CAPEC restructures its attack pattern hierarchy. A workspace that pins its canonical category list to one external version inherits churn every revision; a workspace that mirrors an external taxonomy directly inherits the granularity choices and scope boundaries the external committee made for reasons that may not match the workspace operating model.

The defensible pattern is treating the workspace taxonomy as a stable internal scheme and treating external taxonomies as crosswalks that the workspace maintains as separate mapping artefacts. The crosswalk reads: workspace category -> OWASP Top 10 entry, workspace category -> CWE identifier, workspace category -> OWASP ASVS verification requirement, workspace category -> OWASP LLM Top 10 entry for LLM-specific findings. When OWASP Top 10 revises, the crosswalk updates without disturbing the canonical category on any existing finding. When the workspace adds a new asset class (LLM endpoints, container images), the crosswalk extends without churning the existing category list.

Workspace categoryOWASP Top 10:2021 crosswalkCWE crosswalk (representative)
access-controlA01:2021 Broken Access ControlCWE-22, CWE-200, CWE-285, CWE-639
cryptographyA02:2021 Cryptographic FailuresCWE-261, CWE-296, CWE-310, CWE-327
injectionA03:2021 InjectionCWE-77, CWE-79, CWE-89, CWE-91
configurationA05:2021 Security MisconfigurationCWE-2, CWE-16, CWE-209, CWE-548
supply-chainA06:2021 Vulnerable and Outdated ComponentsCWE-937, CWE-1104
authenticationA07:2021 Identification and Authentication FailuresCWE-287, CWE-294, CWE-307, CWE-384
information-disclosureA04:2021 Insecure Design, A01:2021 Broken Access Control (overlap)CWE-200, CWE-209, CWE-532
business-logicA04:2021 Insecure DesignCWE-840, CWE-841
llm-specificOWASP LLM Top 10:2025 LLM01-LLM10CWE-1039 (broader), CWE-200 (LLM07), CWE-1289 (LLM06)

The crosswalk is illustrative, not exhaustive. The workspace owner extends it for the asset classes the programme covers and for the external taxonomies the audit reads against. The OWASP ASVS verification requirements, OWASP API Security Top 10, OWASP MASVS for mobile applications, and OWASP LLM Top 10 each add a separate crosswalk column when the corresponding asset class is in scope.1,2,3,4,5,6,7

Compliance control mapping as a separate axis

Compliance control mapping is the sixth axis that sits alongside the taxonomy without replacing it. Each finding carries a control reference that names the framework control the remediation evidence supports. The control reference is not the category; the category is the technical class and the control reference is the audit evidence anchor. A SQL injection finding carries vulnerability-class injection in the taxonomy and a control reference of PCI DSS 6.3.1 or ISO 27001 Annex A 8.8 in the compliance field. The category lets the AppSec team find every injection finding open against the customer-facing product line; the control reference lets the GRC team produce evidence that ISO 27001 Annex A 8.8 is operating.

Programmes that conflate the two end up with categories named after compliance controls (SOC 2 finding, PCI DSS finding, ISO finding) that lose the technical signal the remediation owner needs and that read inconsistently when the same issue evidences multiple controls. A finding can evidence ISO 27001 Annex A 8.8 (technical vulnerability management), SOC 2 CC7.1 (system monitoring), PCI DSS 6.3 (vulnerability identification), and NIST 800-53 RA-5 (vulnerability monitoring) simultaneously; the taxonomy classifies the technical class once, and the control reference (or a separate compliance mapping table) reads the controls each technical class evidences.

The clean pattern is: category captures the technical class on a closed list; control reference captures the primary framework control on a separate field; a documented mapping artefact maintained by the GRC owner extends each technical class to the framework controls it typically evidences across ISO 27001 Annex A 8.8, SOC 2 CC7.1, PCI DSS 6.3, NIST 800-53 RA-5, NIST CSF 2.0 ID.RA, and CIS Controls v8.1 control 7.8,9,10,11,12,13

Enforcement at creation, triage, and review

A taxonomy without enforcement is a wish list. The enforcement workflow runs at three points across the finding lifecycle, and the audit evidence is the operating trail across all three.

At finding creation (intake)

The canonical fields require a value per axis from the closed list. Free-text values outside the list either reject the intake (when the workspace is strict) or produce a draft that requires triage rather than landing as a canonical finding silently (when the workspace is lenient and uses scanner imports). The source-emitted scanner tag is preserved on the evidence section so the audit chain from scanner output to canonical category stays intact. The activity log records the initial category, severity, and asset binding at creation.

At finding triage (promotion)

The analyst confirms or adjusts the values, with the original values preserved on the evidence section if the source-emitted tags differ from the canonical classification. Drafts produced by bulk import are reviewed and promoted into canonical findings with the workspace category attached. The triage runs the cross-check between vulnerability class, asset class, exposure context, and remediation owner to ensure the four axes read consistently. Inconsistent combinations (an internal-only finding with an internet-facing exposure context, an LLM-specific finding on a network-service asset class) flag for analyst review rather than landing silently.

At cross-engagement review (programme audit)

Periodic audits sample findings against the value list and flag drift: categories that should have retired, new ad-hoc values that should be promoted into the formal list or rolled back, formal values that are never used and could retire, axis combinations that read inconsistently across engagements. The audit runs at the cadence the policy names (typically quarterly for active programmes, annually as a minimum). The output drives the next taxonomy review cycle.

At policy review (governance)

The taxonomy owner reviews the value list at the documented cadence, processes the drift signals from cross-engagement review, updates the external taxonomy crosswalks (OWASP, CWE, ASVS, LLM Top 10 revisions), and publishes the new value list with an effective date and a change log entry. The activity log records the policy change with the actor and timestamp. Findings created before the policy change retain their original categories; findings created after the change use the new list.

Common failure modes and how the taxonomy prevents each

Six failure modes recur in programmes that operate without a taxonomy. Each one is an audit risk in addition to an operational risk.

1. Spelling drift

The same vulnerability class appears under multiple spellings (access-control, access_control, AccessControl, broken-access-control, A01-2021), and search returns inconsistent counts. The closed-list value enforcement at intake makes this failure mechanically impossible: only the canonical spelling is accepted.

2. Scope drift

The same vulnerability class drifts in scope across engagements because there is no documented boundary between access control and authorisation, between cryptography and configuration, between injection and information disclosure. The taxonomy policy names each axis value with a definition and an inclusion or exclusion test, and the cross-engagement review surfaces drift cases for resolution.

3. Dual-use category

The category field gets used for compliance control mapping at the same time it gets used for technical class, and the dual use makes both readings unreliable. A finding tagged SOC 2 in the category loses the AppSec view; a finding tagged injection in a control-reference field loses the GRC view. The separation of category (technical class) from control reference (compliance anchor) prevents the dual use.

4. Accretion without retirement

The category list grows by accretion as analysts add ad-hoc values during triage, and the list is never reviewed for retirement of obsolete entries or promotion of de-facto standards. The periodic policy review processes drift signals and prunes the list. Programmes that operate without the review end up with forty values that mean the same thing under different spellings.

5. Soft-enforced closed list

The category becomes a free-text field in practice because the closed list is enforced inconsistently at intake. The platform enforces the closed list at creation, drafts are reviewed at triage, and the cross-engagement review catches anything that slipped. Soft enforcement reads at audit as a policy that exists on paper rather than in operation.

6. Leadership rollup against a drifting list

The leadership rollup reads against a category list that no longer matches the value list the analysts use, and the leadership chart misreads as trend what is actually classification drift. The policy review keeps the rollup list in sync with the working list, and the activity log gives leadership a way to see when a category was added or retired.

How compliance frameworks read the taxonomy as operating evidence

Auditors do not read the taxonomy as a single control; they read it through adjacent controls that depend on consistent classification to operate. A programme that classifies findings well produces evidence that several controls read as operating; a programme that does not classify leaves the same controls reading as partial.

  • ISO 27001:2022 Annex A 8.8 (technical vulnerability management) treats vulnerability identification, ranking, and remediation as a documented and repeatable control. The taxonomy is the artefact that makes the ranking and the remediation routing repeatable across team changes; the value list and the named owner are read at audit alongside the operating evidence.10
  • SOC 2 CC7.1 (system monitoring) reads the categorisation across the observation period: do the findings produced across the year reflect a consistent classification, or do they vary with the analyst on duty. CC4.1 (monitoring activities) reads the trend of classes across the period as evidence the monitoring is operating against a stable scheme.11
  • PCI DSS v4.0 Requirement 6.3(vulnerabilities are identified and addressed) and 6.3.1 (vulnerability ranking) read the classification as the artefact that operationalises the ranking process. The audit reads the value list, the named owner, and the finding-level classifications to confirm the requirement is operating.12
  • NIST SP 800-53 RA-5 (vulnerability monitoring and scanning) requires vulnerabilities to be analysed and remediated according to a risk-based approach. The taxonomy operationalises the risk-based approach by capturing the vulnerability class, impact dimension, and exposure context as classification axes that drive the risk picture.8
  • NIST CSF 2.0 ID.RA (risk assessment) and PR.IP (information protection processes) read the classification as a programme-level discipline that produces the inputs to risk assessment. Classifications that drift across engagements produce risk assessments that cannot trend year over year.9
  • CIS Controls v8.1 control 7(continuous vulnerability management) reads the value list and the finding classifications as the operating discipline that produces the management view. Programmes without a taxonomy fail safeguard 7.5 (perform automated application vulnerability scans) on the analytical side because the scans run but the output is not classified consistently.13

The shared pattern is that the classification is itself a control. Storage of scanner output is not the control; the workspace decision about which category that output produces is the control. Programmes that store scanner output without classifying it satisfy the storage requirement and fail the ranking and remediation routing requirement that depends on consistent classification.

Operating the taxonomy on a multi-tool stack

A workspace ingesting Nessus, Burp Suite, Semgrep, CodeQL, SCA, container, and cloud scanner output has to make taxonomy decisions at each ingest. The pattern below covers the recurring decisions.

  • Preserve the source-emitted tag on evidence. The Nessus plugin family, the Burp Suite issue type, the Semgrep rule identifier, and the CWE the SCA tool emitted all stay on the finding evidence so the audit reads the source signal without recovering it from raw scanner exports.
  • Map the source-emitted tag to a workspace category at import. The mapping is documented per scanner family (Nessus plugin family -> workspace category, Burp Suite issue type -> workspace category, Semgrep rule identifier or ruleset -> workspace category, CWE -> workspace category). The mapping artefact is owned by the same role that owns the taxonomy.
  • Triage promotes drafts into canonical findings. Bulk-imported findings arrive as drafts the workspace triage promotes into canonical findings with the workspace category attached. The triage adjusts the category when the imported mapping is wrong for the specific finding context.
  • Asset class is a separate decision from scanner type. A SAST finding is not automatically an internal-only asset class; a code-scan finding inside a publicly deployed customer-facing application carries customer-facing exposure context. The taxonomy axes resolve through the asset binding, not through the scanner that emitted the finding.
  • Remediation owner reads from asset ownership. The remediation owner axis inherits from the asset register entry rather than being denormalised at intake. When ownership changes, the asset register entry updates, and every finding bound to that asset inherits the new owner through the binding (see the asset binding guide for the foreign-key model).
  • Continuous monitoring scans produce findings that inherit the workspace category through the template. The 300+ finding template library ships with pre-set categories so recurring detections of known vulnerability classes inherit the workspace classification rather than being re-tagged each cycle.

The discipline is the same across every scanner: the source signal stays on evidence, the workspace category is the canonical decision, and the activity log captures every change so the audit reads back the classification history.

Operational checklist for a defensible taxonomy

At policy design

  • The five canonical axes are named with their question and their closed value list.
  • Each axis value carries a definition and an inclusion or exclusion test.
  • The crosswalk to OWASP Top 10, OWASP LLM Top 10, CWE, ASVS, and CIS Controls is documented as a separate mapping artefact.
  • The compliance control mapping is documented as a separate axis or table.
  • The named taxonomy owner, deputy, and review cadence are recorded in the policy.
  • The change log structure, version, and effective date pattern are in place.

At finding intake

  • The source-emitted scanner tag is captured verbatim on evidence.
  • The workspace category is applied automatically per the scanner mapping or assigned by analyst triage for non-mapped cases.
  • Asset class, exposure context, and remediation owner resolve through the asset binding rather than being denormalised at intake.
  • Drafts that require analyst triage are flagged for review rather than silently published.

At triage and override

  • The workspace category and any axis adjustments are explicit; bare changes without rationale are not accepted.
  • The cross-axis read (vulnerability class versus asset class versus exposure context) is checked for consistency.
  • The original source-emitted tag remains on the finding evidence section.
  • The activity log captures the actor, timestamp, and any rationale.

At periodic review

  • The value list is reviewed at least annually and on named trigger events (OWASP revision, CWE update, new asset class onboarded).
  • Drift patterns (same value spelled differently, the same finding class assigned different values across engagements) drive value-list updates rather than relying on repeated manual correction.
  • Compliance crosswalk artefacts update when external frameworks revise.
  • Leadership rollup categories stay in sync with the working value list.

For internal security, AppSec, GRC, and vulnerability management teams

A workspace taxonomy is the artefact that turns scanner output into a backlog leadership and audit can both read. Internal security teams, AppSec teams, vulnerability management teams, GRC teams, and security engineering teams operate the taxonomy as a workspace policy rather than as analyst preference, because preference does not survive team change.

  • Anchor the canonical classification to a stable internal scheme; treat OWASP Top 10, CWE, and ASVS as crosswalks rather than as the canonical scheme.
  • Name the five axes (vulnerability class, impact dimension, asset class, exposure context, remediation owner) and run each one as a closed list.
  • Separate the technical category from the compliance control reference so both readings stay reliable.
  • Preserve the source-emitted scanner tag on evidence so the audit chain from scanner output to canonical category stays intact.
  • Run enforcement at finding creation, triage, cross-engagement review, and policy review with named owners and documented cadence.
  • Review the value list annually and on external-taxonomy revision triggers rather than letting it accrete by analyst memory.

For internal security teams, AppSec teams, vulnerability management teams, GRC and compliance teams, and security engineering teams, a defensible taxonomy is the gate that turns scanner output into a backlog the whole programme reads consistently. The vulnerability prioritisation workflow covers how the classification feeds into the prioritisation decision the programme actually operates, and the cross-engagement finding search workflow covers how the structured classification turns into a search interface that answers leadership questions across the backlog.

How SecPortal supports the workspace taxonomy

SecPortal stores findings with structured fields that the workspace taxonomy maps into, preserves the source-emitted scanner tag on evidence, and records every classification change in the activity log so the audit trail reads from the live engagement rather than from a reconstructed history.

Structured category, severity, and control reference on every finding

Findings carry a structured category string for the primary technical class, a severity band for the prioritisation tier, a control reference for the compliance crosswalk anchor, and a CVSS vector for the recalculable score. The workspace taxonomy maps into these fields so the canonical classification is queryable, reportable, and audit-readable. The findings management feature covers the structured fields and the per-finding classification surface.

300+ finding templates with pre-set categories

The shared finding library ships with pre-set category strings, severity bands, and CVSS 3.1 vectors for common vulnerability classes (SQL injection, XSS, IDOR, hardcoded secrets, broken access control, weak cryptography, OWASP LLM Top 10 entries). Recurring detections of known classes inherit the workspace classification rather than being re-tagged each cycle. The template library covers more than 80 vulnerability classes today and extends as the catalogue grows; see the vulnerability encyclopedia for the published reference pages.

Bulk import with source-emitted tag preserved

Findings imported in bulk from Nessus, Burp Suite, and CSV arrive as drafts on the engagement. The originating scanner identifier, plugin or rule reference, and evidence stay attached to the finding record. The triage promotes drafts into canonical findings with the workspace category and severity attached, with the source-emitted tag preserved on evidence so the audit chain from scanner output to canonical category stays intact. The bulk finding import feature covers the supported formats and the draft promotion flow.

Activity log records every classification change

When a finding category, severity, status, or control reference is set, overridden, or recalibrated, the change lands in the workspace activity log with the acting user and timestamp. The audit trail reconstructs the classification history of any finding without recovering it from external logs. The activity log feature covers the audit surface and CSV export.

Compliance tracking and per-control evidence

Compliance tracking pairs the technical classification with the framework control evidence anchor across 21 framework templates (ISO 27001, SOC 2, PCI DSS, NIST 800-53, NIST CSF 2.0, CIS Controls, OWASP ASVS, OWASP MASVS, and others). The audit reads the per-control evidence against the classified findings without forcing the category field to dual-use as a compliance anchor. The compliance tracking feature covers the framework templates and the CSV export.

Global search across structured fields

Global search operates against the structured category, severity, status, and engagement fields rather than against free-text description alone, so cross-engagement queries return counts the taxonomy actually defines. The findings management view surfaces classified findings at the engagement and across engagements. The global search feature covers the indexed surfaces.

Honest scope and what SecPortal does not provide

SecPortal does not ship a managed multi-tag array field on the canonical finding record (the structured taxonomy operates through the category, severity, status, and control-reference fields the platform exposes). SecPortal does not auto-tag findings from third-party taxonomies through packaged integrations to Jira, ServiceNow, or Slack tag systems. SecPortal does not maintain the external OWASP, CWE, ASVS, or LLM Top 10 crosswalk on behalf of the customer workspace; the crosswalk is operated as a customer-owned artefact alongside the taxonomy. The workspace taxonomy owner is responsible for keeping the value list, the crosswalks, and the compliance mapping current.

Related scanner and operating discipline

Taxonomy sits inside a family of classification disciplines a multi-scanner workspace runs. The pages below cover the connected decisions.

  • Scanner output severity normalisation covers how the severity band is set on the canonical finding once the records are collapsed; severity is the prioritisation axis the taxonomy carries alongside the technical class.
  • Scanner output deduplication covers the upstream discipline of recognising when two records describe the same underlying issue; deduplication produces the canonical finding the taxonomy classifies.
  • Scanner finding suppression and deferral controls covers the three structured override types (false positive, accepted risk, severity override) that record how a finding leaves the active backlog without dropping out of the audit trail.
  • Scanner finding to asset binding covers the foreign-key model that resolves the asset class and exposure context axes through the asset register rather than denormalising them onto the finding.
  • Scanner evidence chain covers the seven evidence layers that hold the chain from scan execution to closed finding, with the taxonomy sitting inside the source-emitted and platform-canonical values layer.
  • Importing third-party scanner results covers the import workflow that produces the drafts the taxonomy applies workspace categories to.

For the wider operating discipline the taxonomy plugs into, the cross-engagement finding search workflow covers how the structured classification turns into a search interface, the security leadership reporting workflow covers how the rollup reads against the classification axes, and the vulnerability prioritisation framework covers how class, severity, exposure context, and EPSS combine into the prioritisation decision.

Scope and limitations of this guide

A workspace taxonomy is a workspace policy, not a substitute for scanner-side tuning. A scanner that mislabels a class of findings is a tuning problem at the scanner; the taxonomy is the downstream discipline that turns scanner output into a workspace decision. No closed value list fixes a scanner that lacks coverage for an issue class, and no taxonomy policy substitutes for the analyst judgement an override requires.

Classification claims that depend on whichever scanner happened to fire first almost always understate the operating discipline. Classification claims that decompose into a documented value list per axis, a named owner, a review cadence, an enforced closed list at intake, and a versioned policy are the claims that survive both the audit observation period and the team change.

Frequently Asked Questions

Sources

  1. OWASP, OWASP Top 10:2021
  2. OWASP, OWASP API Security Top 10:2023
  3. OWASP, OWASP Top 10 for LLM Applications 2025
  4. OWASP, OWASP Application Security Verification Standard (ASVS) v4
  5. MITRE, Common Weakness Enumeration (CWE)
  6. MITRE, CWE Research Categories and View Hierarchy
  7. MITRE, CAPEC Common Attack Pattern Enumeration and Classification
  8. NIST, SP 800-53 Rev. 5 RA-5 Vulnerability Monitoring and Scanning
  9. NIST, Cybersecurity Framework (CSF) 2.0
  10. ISO/IEC, ISO 27001:2022 Annex A 8.8 Technical Vulnerability Management
  11. AICPA, SOC 2 Trust Services Criteria CC7.1 System Monitoring
  12. PCI Security Standards Council, PCI DSS v4.0 Requirement 6.3 Vulnerabilities are Identified and Addressed
  13. CIS, CIS Controls v8.1 Control 7 Continuous Vulnerability Management
  14. NIST, SP 800-30 Rev. 1 Guide for Conducting Risk Assessments
  15. SARIF, OASIS Static Analysis Results Interchange Format v2.1.0 (rule and taxonomy elements)
  16. SecPortal, Findings Management Feature
  17. SecPortal, Bulk Finding Import Feature
  18. SecPortal, Activity Log Feature
  19. SecPortal, Compliance Tracking Feature
  20. SecPortal, Global Search Feature

Classify findings on a live workspace record

SecPortal stores findings with structured category, severity, status, control reference, and CVSS vector fields; ships 300+ finding templates with pre-set categories; accepts bulk imports from Nessus, Burp Suite, and CSV with the source-emitted scanner tag preserved on evidence; pairs each finding to a compliance framework template across 21 frameworks; and records every classification change in the workspace activity log so the audit trail reads cleanly from scanner output to closed finding.