SecurityAssess & Improve Security

Risk Dimensions

How Mondoo adjusts finding severity based on real-world asset context across five dimensions: attack surface, blast radius, business priority, exploitability, and news.

Not every asset with the same vulnerability deserves the same urgency. An internet-facing production database and a developer's test VM might share the same CVE, but the real-world risk is very different. Risk dimensions are how Mondoo captures that context, adjusting each finding's score based on the asset it affects.

The five dimensions

Mondoo evaluates every asset across five dimensions. Each can raise or lower the risk score of findings on the asset.

Attack surface

How exposed the asset is to the outside world.

LevelMeaningEffect on risk
InternetReachable from the public internetRaises
NetworkReachable from an internal networkNeutral
LocalHas open ports, but only locallyLowers
SystemService running but not listening on any networkLowers
NoneNo detected attack surfaceLowers

A Linux asset showing internet-facing attack surface classification

Blast radius

What kind of service the asset provides. High-value targets weigh more.

Service typeEffect on riskExamples
DatabaseStrongly raisesPostgreSQL, MySQL, MongoDB
IdentityRaisesLDAP, Active Directory, OAuth providers
LLM AgentStrongly raisesClaude, Gemini, Codex
Open ConnectionsStrongly raisesA high number of open connections
KubernetesRaisesAPI server, kubelet, etcd
KeysNeutralKey vaults, HSMs

Business priority

How important the asset is to your organization. Unlike the other dimensions, business priority is not auto-detected. You apply it with annotations.

Environment classification (default key: mondoo.com/business-priority):

ValueEffect on risk
business-criticalRaises
devLowers
testSignificantly lowers

CIA (Confidentiality / Integrity / Availability) rating (default key: mondoo.com/cia):

A CIA rating can only raise risk. Use it to flag assets that handle sensitive data; higher values contribute more.

ValueMeaningEffect on risk
0Public information, no integrity or availability needsRaises slightly
1Internal information, basic integrity needsRaises somewhat
2Sensitive data, protected access requiredRaises moderately
3Critical data, strict CIA requirementsStrongly raises

If both annotations are present, the one with the stronger effect wins.

A Windows asset annotated as business-critical

Exploitability

How likely a vulnerability is to be exploited in the real world. Mondoo combines two industry sources:

  • EPSS (Exploit Prediction Scoring System): the probability of exploitation in the next 30 days.
  • KEV (Known Exploited Vulnerabilities): whether CISA has confirmed real-world exploits.

A Medium-severity CVE that's actively being exploited often outranks a Critical one with no known exploits.

Note: Exploitability applies only to vulnerability findings, not check failures.

News

Whether a vulnerability is trending in security media and social channels. High-profile CVEs attract more attack activity. News can only raise risk.

Note: News applies only to vulnerability findings, not check failures.

Override automatic detection

Mondoo detects most dimensions automatically from scan data, but detection isn't always right. A server behind a VPN might look network-accessible when it's really local; a database on a non-standard port might not be identified. Annotations let you correct this.

Annotations can be set at three levels:

  • Organization. Applies to every asset in the org.
  • Space. Applies to every asset in the space.
  • Asset. Applies to a single asset.

Narrower scopes win: an asset annotation overrides a space annotation, which overrides an organization annotation. Cloud provider tags from AWS, Azure, GCP, and others are ingested as asset labels and work as overrides too.

Risk dimensions displayed for an asset in the Mondoo App

Annotation reference

Annotation keyValid valuesDimension
mondoo.com/attack-surfaceinternet, network, local, system, noneAttack Surface
mondoo.com/blast-radiusdatabase, llm-agent, identity, open-connections, kubernetes, keysBlast Radius
mondoo.com/business-prioritybusiness-critical, dev, testBusiness Priority
mondoo.com/cia0, 1, 2, 3Business Priority
mondoo.com/exploitability-1.0 to 1.0Exploitability
mondoo.com/news-1.0 to 1.0News

Examples

  • Correct a wrong exposure level. A server behind a VPN shows as network-accessible. Set mondoo.com/attack-surface: local on the asset.

  • Mark dev environments. Set mondoo.com/business-priority: dev on a whole space dedicated to development. Every asset in the space gets a lower score.

  • Flag systems with sensitive data. Apply mondoo.com/cia: 3 to assets that process payments or PII so their findings surface first.

Tune dimension weights

You can adjust how strongly each dimension influences scores, or disable a dimension entirely. This is set at the organization level and applies to every space.

For each dimension you can:

  • Adjust its weight to make it count more or less toward the final score.
  • Disable it to remove its effect entirely.
  • Add custom detections, such as additional key-value pairs that satisfy the business-priority dimension.

Risk dimension configuration in the Mondoo App

To make these changes, read Configure Risk Dimensions.

Why it matters

Internet-facing database vs. test VM. A critical CVE appears on both an internet-facing PostgreSQL database and a developer's test VM. Without dimensions, both findings score similarly. With dimensions, the database climbs (internet exposure, database blast radius, business-critical) and the VM drops (local-only, test environment). The database lands in Top Actions; the VM falls down the list.

Trending CVE on a payment server. A newly disclosed CVE starts trending and shows high exploitation activity. On a server annotated with mondoo.com/cia: 3, both the exploitability and news dimensions raise the score, and the business-critical classification adds more. The finding jumps to the top of the priority list without any manual intervention.

See also

On this page