Production hosts · drift, integrity and readiness — prioritize attention items first.
Hosts checked
1
Telemetry coverage this window
High-risk drift
0
Needs operator review
Ready hosts
1
Baseline aligned posture
Evidence bundles
2
Stub bundles in Evidence (API catalog)
Collectors
1 / 1online
Fleet heartbeat
2 May 2026, 17:26 UTC
Stale slices
No overdue telemetry slices.
Notable items
No open drift in the latest window.
Drift volume (index)
No historical drift index yet — run scans on separate days to build a trend.
Open findings are grouped by integrity class — triage high-severity items first.
Top classes (new findings)
host-167-172-224-47 · blackglass-lab-01 · Ubuntu 24.04
Readiness score from the latest scan — higher is closer to baseline alignment.
Integrity first, monitoring second
BLACKGLASS is not a SIEM, a vulnerability scanner, or a log aggregator. It is a configuration-integrity product. Its job is to answer one question: is this host still in the configuration we approved, and if not, what changed, when, and why does it matter? Every feature — baselines, drift detection, risk classification, evidence export — exists to answer that question reliably and with an auditable record.
Baseline creation
A baseline is a point-in-time snapshot of a host's security-relevant configuration: listening ports, local users and group memberships, sudo rules, enabled systemd units, SSH daemon policy, firewall rules, installed packages, and kernel parameters. Without an explicit baseline, drift is undetectable — you cannot tell whether a new port or user is authorized or a sign of compromise. Baselines are also compliance evidence: proof that a system was in an acceptable state at a specific time.
Drift detection
At each scan, BLACKGLASS re-collects the same surface areas and diffs against the active baseline. Every changed, added, or removed item surfaces as a finding. Configuration drift is a well-documented attack vector — attackers abuse CI pipelines, provisioning scripts, and emergency access to make changes that are never reviewed or reverted. BLACKGLASS makes that drift visible and attributable.
| Drift category | Example signal |
|---|---|
| Network exposure | New port 8080/tcp listening on 0.0.0.0 — not in baseline |
| Identity drift | New user deploy2 added to sudo group |
| Persistence | New systemd service enabled at boot — not in baseline |
| SSH weakening | PermitRootLogin changed from no to yes |
| Firewall regression | DROP policy on INPUT chain replaced with ACCEPT |
| Package drift | openssh-server downgraded from 9.3 to 8.9 |
Risk classification
Raw findings are classified into categories that map to standard security risk taxonomy: network exposure, identity drift, persistence, policy mismatch, and package / supply-chain changes. Classification tells a responder whether a finding is a potential lateral-movement vector, a compliance gap, or a sign of attacker activity — so teams can triage rather than guess.
Evidence and reporting
Encryption and transport
Access control
Data minimisation and retention
Secrets and credential handling
Audit logging
Platform hardening