Security & Compliance Features

Feature Set

The Security & Compliance Feature Set delivers continuous visibility and control over configuration integrity, cryptographic posture, and vulnerability exposure across the network infrastructure.

It combines the discovery and automation strength of StableNet® with the intelligence and governance framework of TOTUUS — ensuring that every device configuration, cryptographic standard, and security policy is monitored, validated, and enforced.

This feature set forms a critical layer in achieving operational compliance, supporting frameworks such as TSA, and NCSC guidelines.

The feature set empowers organisations to move from reactive patching to proactive, governed configuration assurance.

By combining StableNet®’s automation capabilities with TOTUUS’ data intelligence and compliance governance, it delivers a unified approach to securing configurations, validating cryptography, and maintaining audit-ready confidence across every managed domain.

image

Crypto Discovery and QR Readiness Assessment

Automatically identifies cryptographic protocols, algorithms, and key exchange mechanisms in use across network devices.

Detects use of deprecated or non-compliant encryption standards (e.g., SSL v2/v3, weak ciphers) and assesses readiness for Quantum-Resistant (QR) cryptography.

Configuration Change

Vulnerability (Without Mitigation)

Integrates with TOTUUS Vulnerability Intelligence (TVI), external CVE feeds to identify known vulnerabilities relevant to discovered assets.

Flags affected devices, operating systems, or firmware versions where no mitigation or workaround is currently in place.

What are Managed Solutions?

Vulnerability (With Mitigation)

Identifies vulnerabilities where a vendor-provided mitigation or configuration workaround exists that have been applied to ensure that vulnerability reports are accurate when compared to the estate being assesd, rather than continual false possitives.

TOTUUS links the mitigation guidance to StableNet® configuration templates, enabling direct validation of whether the mitigation has been applied.

image

Security Hardening and Compliance Configuration (Direct)

Provides direct configuration validation against defined security baselines or hardening standards.

Uses StableNet®’s policy engine to audit device configurations and TOTUUS governance model to record compliance status.

api getaway

Security Configuration Remediation

Enables automated or semi-automated correction of non-compliant configurations.

StableNet® executes approved remediation commands or template updates, while TOTUUS tracks actions, authorisations, and results for governance and audit.

img

Push-Out Configuration

Extends configuration management into controlled deployment workflows.

Allows authorised users to push validated configurations or golden images to managed devices using StableNet® automation.

Automatic Execution

Golden Image Management & Drift Detection

Defines standard configuration templates (“golden images”) per device type, model, or customer.

Continuously compares live configurations to golden images to detect and report drift.

image

Password of Last Resort (PLR)

Provides a secure mechanism for managing emergency device access credentials.

PLR credentials are encrypted, tightly controlled, and only accessible under defined break-glass conditions.