Network Intake
Capture facility, environment, targets, services, findings, severity, and risk score from one clean interface.
MUD™ helps small teams turn network findings into NIST mappings, compliance dashboard output, eMASS-style POA&M payloads, remediation fix packs, and active-defense decisions.
MUD is designed for small teams that need clear security outputs without standing up heavy enterprise tooling first.
Capture facility, environment, targets, services, findings, severity, and risk score from one clean interface.
Map findings to NIST 800-53 and NIST 800-171 style controls for remediation and audit alignment.
Summarize satisfied, partial, finding-present, and needs-evidence controls in a readable dashboard output.
Generate POA&M-style payloads with vulnerability ID, severity, affected asset, control reference, status, and remediation.
Download remediation-ready fix pack artifacts to support technical cleanup and evidence workflows.
Simulate routing decisions such as monitor, inspect, or contain before integrating production enforcement.
The current MVP/demo supports the workflow advertised publicly: intake, mapping, evidence, fix packs, and simulated active defense.
The hosted demo is available at www.micro-utilitydefender.com and includes a branded interface with readable output for NIST mapping, compliance dashboard, eMASS-style payloads, monitoring evidence, and active-defense simulation.
Enforcement integrations are intentionally framed as planned. Current active-defense mode returns decisions without modifying firewall, WAF, or cloud policy rules.
MUD’s next phase is about turning simulation into controlled enforcement while keeping the audit evidence workflow intact.
Use MUD active-defense decisions to add high-risk IPs to a Cloudflare WAF/IP-list workflow.
Support Google-native enforcement through load balancing and Cloud Armor for production cloud deployments.
Provide an agent-style enforcement option for VM, reverse-proxy, and on-prem environments.
Launch MUD, run the sample TLS finding, generate control mappings, review compliance output, and test the active-defense simulation workflow.