NOTE: logging in will allow you to access restricted access resources as well as the vulnerability dashboard and Point of Entry data dashboard. If you do not have credentials, you can request them here.