Essential functions of a transformer

  • DA trusted interface between the transformer and the third-party scanner, allowing the transformer to ingest data from the scanner. Possible implementations include passing scan report export files to the transformer or querying the scanner via an API endpoint.

  • A system for mapping specific elements of the scanner data to their corresponding elements within PE.

  • Accurate integration with the PE environment: for example, so that PE managed nodes identified by the scanner are correctly identified in PE.

  • A trusted interface between the transformer and PE, enabling the transformer to parse scanner data, transform it into a standard format that the PE vulnerability remediation service can read, and push the data into PE.

Testing and logging should be consistent with your organization’s requirements.