PRISM AUTOMATED NETWORK ASSESSMENT
Checking authentication…
Program Dashboard
Georgia Program v1.0
Sites Assessed
47
of 1,200+ total
Green — Ready
29
61.7% of assessed
Amber — Issues
14
29.8% of assessed
Red — Blocked
4
8.5% of assessed
Regional Progress 12 regions
RegionAssessedGreenAmberRedProgress
Atlanta Regional12 831
Northeast Georgia8 620
Coastal7 421
Middle Georgia6 510
Northwest Georgia5 320
8 more regions...9
Open Critical Findings 4 active
SiteCVECVSSStatus
Fulton Superior CVE-2024-21762 9.8 Remediation
DeKalb Magistrate CVE-2023-44487 9.1 Open
Chatham Superior CVE-2024-3400 9.3 Patch Pending
Richmond Superior CVE-2024-21413 9.1 Open
Recent Assessments
Court SiteCountyRegionEngineerDateLLMDurationOutcome
Fulton County Superior Court Fulton Atlanta Regional T. Washington 2026-04-08 local 1h 24m Amber
DeKalb County Magistrate Court DeKalb Atlanta Regional M. Okafor 2026-04-07 bedrock 1h 52m Red
Gwinnett County Superior Court Gwinnett Atlanta Regional K. Brown 2026-04-07 local 1h 18m Green
Chatham County Superior Court Chatham Coastal H. Foster 2026-04-06 local 1h 31m Red
Cobb County Superior Court Cobb Atlanta Regional D. Park 2026-04-05 local 1h 07m Conditional
Bibb County Superior Court Bibb Middle Georgia V. Johnson 2026-04-04 local 1h 15m Green
Fulton County Superior Court
FIPS 13121 · Atlanta Regional · Eng: T. Washington · PRISM-GA-07
llama-3.2-3b · local
● RUNNING 00:24:31
Process 1 — Host Discovery
nmap_mcp · nmap_host_discovery
23 hosts discovered in 192.168.10.0/24 · 2m 14s
02:14
Process 2 — Service & Port Enumeration
nmap_mcp · nmap_service_scan
147 open ports across 23 hosts · 8m 42s
08:42
Process 3 — OS & Hardware Fingerprinting
nmap_mcp · nmap_os_fingerprint
Windows 10 (14), Windows Server 2019 (4), Linux (5) · 3m 06s
03:06
Process 4 — Vulnerability Scanning
openvas_mcp · openvas_scan
Full and Fast scan · 23 targets · polling every 30s
10:29
5
Process 5 — Configuration & Credential Checks
nuclei_mcp · nuclei_config_check
Awaiting Process 4
6
Process 6 — Network Architecture Analysis
nmap_mcp · nmap_topology
Awaiting Process 4
7
Process 7 — PRISM Connectivity Validation
nuclei_mcp · nuclei_prism_connectivity
Awaiting Process 4
Live Log
Loading…
Select a session to view its report, or click a Session ID in the History screen.
159 counties
Session IDCourt SiteCountyRegionEngineerDateDurationHostsCriticalHighLLMOutcome
1Site identity
2Network scope
3Assessment config
4Authorization
5Launch
Court site identity
Region is required.
County is required.
Court type is required.
Registry match
Address
FIPS
IT Contact
Phone
No registry record found. Enter details manually.
Site details pre-filled from registry.
Contact name is required.
Network scope
Must be a valid private CIDR (10.x, 172.16-31.x, 192.168.x) Valid: 10.0.0.0/8 · 172.16.0.0/12 · 192.168.0.0/16
One or more invalid CIDR entries.
Loaded from cache
Loaded from cache
Appliance ID is required. Saved automatically after first use.
Assessment configuration
Assessment processes
Process 1 — Host discovery Nmap host enumeration
Process 2 — Service & port enumeration Nmap service scan
Process 3 — OS & hardware fingerprinting Nmap OS detection
Process 4 — Vulnerability scanning OpenVAS CVE scan
Process 5 — Configuration & credential checks Nuclei templates
Process 6 — Network architecture analysis Nmap topology
Process 7 — PRISM connectivity validation Nuclei PRISM template
Legacy CMS transition D-010 Tier 3
Legacy CMS endpoint present on this network Off — all findings count toward determination
Legacy CMS Transition Exemption active. Findings from the IP below are excluded from determination. PRISM connectivity check applies to new CMS endpoint only.
Valid IP address required.
Authorization confirmation
Checklist
0 / 6
Written authorization received from court IT contact or county administrator
AOC program authorization on file for this engagement
AWS Simulated Events submission completed (if scanning from AWS VPC)
Scan window confirmed with site contact — no blackout period in effect
Scope confirmed — scan targets within approved LAN ranges only
DBiz.ai field engineer identity verified and VPN tunnel established
All 6 authorization items must be confirmed before proceeding.

Full name required (first and last).
Authorization reference
AOC program authorization
Statewide program auth from the Administrative Office of the Courts
Format: AOC-AUTH-YYYY-NNNN
County authorization
Written auth from county IT or county administrator
Ticket, email ref, or letter ID
Sentry IT authorization
Sub-engagement auth from Sentry IT as prime contractor
Format: SENTRY-YYYY-NNNN
AWS Simulated Events
AWS confirmation from a Simulated Events submission
AWS confirmation ID
Authorization type is required.
Reference number is required.
Assessment summary
Court
County / Region
Network scope
Engineer
Appliance
Court type
Orchestrator prompt preview
Pre-assessment outcome expectation
Green
Expect ready
Amber
Expect issues
Conditional
Expect exemption
Red
Expect blocked

Outcome is determined by the assessment engine. This records the engineer's pre-scan expectation only.

Step 1 of 5 — Enter court site details
Display
Choice persists in browser storage. "Auto" follows your OS's light/dark mode live.
Appliance Identity
From the APPLIANCE_ID env var — stamped into every assessment audit record. Edit .env and rebuild the orchestrator to change.
Browser-only label shown in the sidebar. Does not affect scan attribution. Persisted in this browser only.
UI-only override of the connectivity-check target shown in System Health. The scan itself reads PRISM_ENDPOINT_URL from env.
Displayed in the topbar. Persisted in this browser only.
Pre-fills the engineer name field on new assessments. Can be overridden per assessment.
From PRISM_D010_MODE env var. rules = deterministic Python (default), llm = LLM determination, skip = defer to cloud.
CWE → 800-53 + CJIS overlay versions used by the OSCAL emitter. From orchestrator/compliance/*.yaml; restart the orchestrator after edits.
Assessment Defaults
System Health
llama-3.2-3b-int4 OpenVINO host:11435
Checking...
...
AWS Bedrock Nova Micro us-east-1
Checking...
...
PRISM Endpoint
Checking...
...
AWS Pipeline DynamoDB + S3
Checking...
...
OpenVAS (gvmd) via openvas-mcp
Checking...
...
MariaDB prism_sessions · prism_findings · prism_upload_queue
Checking...
...
Last checked: —
Active LLM path:
AWS Upload Queue
Pending
In flight
Uploaded
Failed
Queue snapshot from prism_upload_queue. Drains automatically when AWS endpoints are reachable.
NVD Enrichment Cache
CVE → CWE mapping cache feeding the compliance overlay's CWE tier. Auto-refreshes nightly at 02:30; manual refresh below pulls a configurable lookback window. First-time bootstrap takes ~5h without an NVD_API_KEY, ~30min with one.
Total CVEs
With CWE
Last refresh
Mobile Notifications
Push notifications fire on scan completion, scan abort, startup orphan sweeps, and LLM outages. Configure via NOTIFY_* env vars in .env; restart the orchestrator to apply.
Loading…
D-010 Assessment Rulebook READ ONLY
Version
1.0
Approved by
Tim Hill, CISO
Approval date
April 2026
LLM temperature
0 (deterministic)
Determination thresholds
Critical CVSS floor
9.0
Triggers R-1
Amber High CVE count
3
Triggers A-2
Amber Medium CVE count
10
Triggers A-3
Thresholds require CISO approval and a version increment to change. Edit d010_rulebook/thresholds.json and redeploy.
Exemption tiers
Technical DBiz.ai CISO + Sentry IT PM · 90 days
Program AOC CIO · 180 days
Legacy CMS Sentry IT PM · expires at CMS cutover
Platform
PRISM version
v1.0
Program
Georgia Court Readiness
LLM primary
llama-3.2-3b-int4 (local · OpenVINO)
LLM escalation
Bedrock Nova Micro
Overflow threshold
10,000 tokens
Docker stack
9 containers
Loading scans…