Skip to main content
Kliper includes six integrated security tools that let assessors validate technical controls directly from the assessment workbench. Each tool targets a specific PCI DSS requirement, produces structured findings, and can auto-fill assessment answers with a single click.
ToolPCI RequirementPurpose
SSL/TLS Checker4.2.1Validate certificate grades, protocols, and cipher suites
CVE Lookup6.3Search the NVD for known vulnerabilities by software/version
ASV Scan Import11.3.2Upload and parse Qualys/Tenable/Rapid7 scan results
Pen Test Parser11.4Upload and parse Burp Suite, Nessus, or ZAP reports
Headers & DNS2.2.5Check HTTP security headers and DNS records
Remediation DashboardAggregated view of all findings across all tools

Accessing Security Tools

1

Open Your Assessment

Navigate to an assessment from the Engagement Hub or the Assessments page.
2

Open the Security Tools Tab

In the assessment workbench, open the Security dropdown in the top navigation bar and select Security Tools. The Security Tools panel opens with six sub-tabs.
3

Select a Tool

Click a sub-tab to switch between tools. Each tool operates independently — results from one tool do not affect another.

SSL/TLS Checker

The SSL/TLS Checker validates a domain’s certificate configuration and assigns a letter grade (A through F). It uses SSL Labs for detailed analysis with a direct TLS fallback when SSL Labs is unavailable.

Running a Check

1

Enter the Domain

Type the domain name (e.g., example.com) in the input field. Do not include https:// — the checker adds it automatically.
2

Click Run Check

The check runs server-side. SSL Labs analysis may take 30–60 seconds; if SSL Labs is overloaded, the system falls back to a direct TLS connection check that completes in under 5 seconds.
3

Review Results

The result card displays:
FieldDescription
GradeLetter grade badge (A+, A, B, C, D, F) color-coded green through red
PCI CompliancePASS or FAIL badge — FAIL if grade is below B, TLS < 1.2, or weak ciphers detected
Certificate IssuerThe certificate authority (e.g., Let’s Encrypt, DigiCert)
Valid UntilCertificate expiration date
ProtocolSupported TLS versions
Cipher SuiteActive cipher suites
PCI IssuesSpecific problems that affect PCI compliance (e.g., “TLS 1.0 enabled”, “Weak cipher suites”)
4

Apply to Requirement

Click Apply to Req 4.2.1 to auto-fill the assessment answer with a structured summary of the check results, including grade, compliance status, and identified issues.

Check History

Previous checks are listed below the input form with the domain, grade, date, and PCI status. Expand any previous check to view its full results or re-apply it to the assessment.
SSL Labs results are cached by SSL Labs itself. If you need a fresh analysis, wait a few minutes between checks of the same domain.

CVE Vulnerability Lookup

The CVE Lookup tool searches the NIST National Vulnerability Database (NVD) for known vulnerabilities affecting a specific software product and version. Results are cached locally to reduce API calls and improve response times.

Searching for Vulnerabilities

1

Enter Product and Version

Type the software product name (e.g., Apache HTTP Server) and version (e.g., 2.4.49) in the input fields.
2

Click Search

The system queries the NVD API. Results typically return within 2–5 seconds, or instantly if the product/version combination has been searched before (cached for 7 days).
3

Review CVEs

Each CVE result displays:
FieldDescription
CVE IDThe unique identifier (e.g., CVE-2021-41773)
SeverityColor-coded badge — Critical (red), High (orange), Medium (yellow), Low (blue)
CVSS ScoreNumerical score from 0.0 to 10.0
DescriptionSummary of the vulnerability
PublishedDate the CVE was published
4

Apply to Requirement

Click Apply to Req 6.3 to auto-fill the assessment answer with a summary of discovered CVEs, including severity counts and CVSS scores.

Lookup History

All previous lookups are displayed below the search form with product, version, CVE count, and date. Expand any previous lookup to review its results or re-apply to the assessment.
Good candidates for CVE lookup include web servers (Apache, Nginx), databases (MySQL, PostgreSQL), frameworks (Node.js, Spring), and libraries (OpenSSL, jQuery, Log4j).

ASV Scan Import

The ASV Scan Import tool parses CSV exports from Approved Scanning Vendors — Qualys, Tenable (Nessus), and Rapid7 — and converts them into structured findings with PCI compliance determination.

Uploading a Scan

1

Fill In Scan Details

Enter the scan metadata:
  • Scan Date — when the scan was performed
  • Quarter — the PCI quarter this scan covers (e.g., Q1 2026)
  • Vendor — select Qualys, Tenable, Rapid7, or Generic (auto-detected if left as Auto)
2

Select the CSV File

Click the file input to select a .csv file exported from your ASV scanning tool.
3

Click Upload & Parse

The system detects the vendor format from the CSV column headers and parses each row into a normalized finding with host, port, severity, CVSS score, and remediation guidance.
4

Review Results

The result card shows:
  • PASS / FAIL badge — FAIL if any finding has CVSS score >= 4.0
  • Host count — number of unique hosts scanned
  • Vulnerability count — total number of findings
  • Severity breakdown — badge counts for Critical, High, Medium, Low, Info
5

Apply to Requirement

Click Apply to Req 11.3.2 to auto-fill the assessment answer with scan summary, compliance status, host count, and severity breakdown.

Supported Vendor Formats

VendorDetection MethodKey Columns
QualysColumn header contains QIDIP, DNS, QID, Title, Severity, CVSS, Port, Protocol, CVE ID, PCI Vuln
Tenable (Nessus)Column header contains Plugin IDPlugin ID, CVE, CVSS, Risk, Host, Port, Name, Synopsis, Solution
Rapid7Column header contains Vulnerability IDVulnerability ID, Asset IP, Asset Names, Severity, CVSS Score, Title
Generic CSVFallback formatBest-effort column matching — looks for host, port, severity, cvss, title, description

Managing Findings

Expand a scan result to view all findings. Each finding row displays:
  • Severity badge — color-coded (Critical, High, Medium, Low, Info)
  • Title — vulnerability name
  • Host and Port — affected asset
  • CVSS Score — numerical risk score
  • Remediation Status — dropdown to mark as Open, In Progress, Fixed, or Accepted Risk
  • False Positive — toggle to flag false positives (excluded from compliance calculation)
Use the severity filter dropdown to focus on specific severity levels.
PCI DSS requires that all vulnerabilities with CVSS score 4.0 or higher are resolved for a passing ASV scan. Findings marked as False Positive are excluded from this calculation, but the assessor must document the justification.

Penetration Test Parser

The Pen Test Parser imports results from common penetration testing tools and normalizes findings into a unified format. It supports three major formats and a generic CSV fallback.

Uploading Test Results

1

Fill In Test Details

Enter the penetration test metadata:
  • Test Type — External, Internal, or Segmentation
  • Test Date — when the test was performed
  • Tester Name — the person or firm that conducted the test
  • Tool — select Burp Suite, Nessus, OWASP ZAP, or Generic (leave as Auto-detect for automatic format detection)
2

Select the Report File

Click the file input to select an .xml or .csv file exported from the penetration testing tool.
3

Click Upload & Parse

The system auto-detects the file format:
FormatDetection
Burp Suite XML.xml file with <issues> root element
OWASP ZAP XML.xml file with <OWASPZAPReport> root element
Nessus CSV.csv file with Plugin ID column header
Generic CSV.csv file — best-effort column matching
Findings are extracted and normalized with severity, confidence, host, port, CVE/CWE references, and remediation guidance.
4

Review Results

The result card shows:
  • PASS / FAIL badge — FAIL if any Critical or High findings exist
  • Tool detected — which parser was used (Burp, Nessus, ZAP, Generic)
  • Test type — External, Internal, or Segmentation
  • Severity breakdown — badge counts for High, Medium, Low
5

Apply to Requirement

Click Apply to Req 11.4 to auto-fill the assessment answer. The auto-fill maps the test type to the correct sub-requirement:
Test TypeTarget Sub-Requirement
External11.4.3 (External penetration testing)
Internal11.4.2 (Internal penetration testing)
Segmentation11.4.5 (Segmentation penetration testing)

Managing Findings

Expand a result to view all findings with severity filter and pagination. Each finding displays:
  • Severity badge — High (orange), Medium (yellow), Low (blue)
  • Title — vulnerability name
  • Host — target URL or IP
  • Confidence — Certain, Firm, or Tentative
  • Remediation Status — dropdown to track fix progress
  • Expandable detail — full description and recommended remediation (click the finding row)
Informational findings are parsed and stored but excluded from the PASS/FAIL determination and severity badge counts. Only Critical, High, Medium, and Low findings affect compliance status.

HTTP Header & DNS Checker

The Header & DNS Checker validates HTTP security headers and DNS security records for a domain, assigning a letter grade (A through F) and identifying PCI-relevant configuration gaps. All checks run server-side using Node.js built-ins — no external API dependencies.

Running a Check

1

Enter the Domain

Type the domain name (e.g., example.com) in the input field.
2

Click Run Check

The system performs two checks in parallel:
  1. HTTP headers — makes an HTTPS request to the domain and evaluates the response headers
  2. DNS records — queries DNS for SPF, DMARC, and CAA records
3

Review Results

The result card displays a grade badge and a detailed checklist of all checks.
4

Apply to Requirement

Click Apply to Req 2.2.5 to auto-fill the assessment answer with the grade, header status summary, DNS record findings, and PCI compliance status.

HTTP Security Headers

HeaderExpected ValueStatus if Missing
Strict-Transport-Security (HSTS)Present with max-age >= 31,536,000Fail
Content-Security-Policy (CSP)Present (warn if contains unsafe-inline or unsafe-eval)Fail
X-Content-Type-OptionsnosniffFail
X-Frame-OptionsDENY or SAMEORIGINFail
Referrer-PolicyPresentWarn
Permissions-PolicyPresentWarn
Cache-ControlContains no-store or no-cacheWarn

DNS Security Records

RecordWhat Is CheckedStatus if Missing
SPFTXT record starting with v=spf1Warn
DMARCTXT record at _dmarc.{domain}Warn
CAACertificate Authority Authorization recordsWarn

Grading

The overall grade is calculated from the pass/warn/fail distribution:
GradeCondition
AAll checks pass
BAll checks pass or warn (no failures)
C1–2 failed checks
D3 or more failed checks
FCritical failures (missing HSTS or missing CSP)

PCI Compliance

The check is marked PCI Fail if any of these critical headers are missing:
  • Strict-Transport-Security (HSTS)
  • Content-Security-Policy (CSP)
  • X-Frame-Options
For subdomains, DNS records like SPF and DMARC are typically configured on the root domain. Missing SPF/DMARC on a subdomain is reported as a warning, not a failure.

Remediation Dashboard

The Remediation Dashboard provides a unified view of all findings from all five security tools. It does not create new data — it aggregates and displays findings that already exist in the individual tool results.

What It Shows

The dashboard is organized into five sections: Summary Cards
CardDescription
Total FindingsCount of all findings across all tools
Critical + High OpenCount of open findings with Critical or High severity (highlighted in red)
Remediation RatePercentage of findings that are Fixed or Accepted Risk. Color-coded: green (80%+), yellow (50–79%), red (below 50%)
Tools with FindingsCount of tools that have at least one finding (e.g., 5/5)
By Severity Horizontal bar chart showing finding counts for Critical, High, Medium, and Low severities. Each bar is color-coded and proportional to the total finding count. By Status Horizontal bar chart showing finding counts by remediation status: Open, In Progress, Fixed, and Accepted Risk. By Tool Breakdown showing which security tool contributed which findings, with the tool icon and count badge. By PCI Requirement Table mapping findings to their PCI DSS requirements (4.2.1, 6.3, 11.3.2, 11.4, 2.2.5) with requirement label, total finding count, and critical finding count. Top Open Findings A prioritized list of the 20 most severe open findings across all tools. Each row shows the severity badge, tool icon, finding title, target (host/domain), and mapped PCI requirement.
The Remediation Dashboard updates in real-time as you change finding statuses in the individual tool tabs. Switch between tools and the dashboard to track remediation progress as findings are addressed.

The security tools are designed to be used in a logical sequence during a PCI DSS assessment:
1

SSL/TLS Checker

Start by checking SSL/TLS certificates for all in-scope domains. This establishes the cryptographic baseline and addresses Req 4.2.1.
2

Headers & DNS

Check HTTP security headers and DNS records on the same domains. This identifies server hardening gaps for Req 2.2.5.
3

CVE Lookup

Search for known vulnerabilities in any software identified during the assessment — web servers, databases, libraries, and frameworks. This addresses Req 6.3.
4

ASV Scan Import

Upload the quarterly ASV scan report from the organization’s scanning vendor. This provides the external vulnerability scan evidence for Req 11.3.2.
5

Pen Test Parser

Upload the most recent penetration test report. This provides testing evidence for Req 11.4 (external, internal, and segmentation testing).
6

Remediation Dashboard

Review the aggregated findings across all tools. Prioritize Critical and High findings, track remediation progress, and verify that the remediation rate is acceptable before finalizing the assessment.

Auto-Fill Summary

Each tool can auto-fill its corresponding PCI DSS requirement with a structured justification:
ToolTarget RequirementJustification Includes
SSL/TLS Checker4.2.1Domain, grade, protocol version, PCI issues, compliance status
CVE Lookup6.3Product, version, CVE count, severity breakdown, CVSS scores
ASV Scan Import11.3.2Vendor, scan date, host count, finding count, PASS/FAIL
Pen Test Parser11.4.2 / 11.4.3 / 11.4.5Tool, tester, date, test type, finding count, severity breakdown
Headers & DNS2.2.5Domain, grade, headers passed/total, DNS records, PCI status
Auto-fill generates draft text based on tool results. The assessor should review and supplement the auto-filled content with additional context, observations, and professional judgment before finalizing the assessment answer.