Hey @Adrian Junge! The lack of centralized databases really makes that difficult to accomplish. A more common approach is to identify key pieces of software to query for/set up policies to monitor. If you’re just looking at the
Important stuff, it’s a lot easier to manually manage. Then rely on vulnerability scanning to keep an eye out for potential problems.