Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Prism provides you with an area to review the issue rules or automated changes you have made. Within Prism users are able to perform the following actions to the status of an issue:

This view assists with the ongoing review of these items and will allow users to edit or remove those settings from Prism.

...

Each tab provides:

...

Vulnerability Title

...

Service

...

Project

...

Phase

...

Managing Issue Rules on the Platform

The Platform offers a dedicated area for reviewing and managing issue rules, including automated changes made to the status of issues. This feature is designed to assist users in maintaining an organized and efficient approach to issue management.

...

Overview of Issue Rule Management:

  1. Review and Edit Settings:

    • Access a comprehensive view of all the issue rules and automated changes you have applied.

    • This interface facilitates ongoing review and modification of these settings.

  2. Details Provided in Each Tab:

    • Vulnerability Title: Identifies the specific vulnerability.

    • Service: Indicates the service associated with the issue.

    • Project: Shows the project linked to the issue.

    • Phase: Details the phase in which the issue was identified.

    • Date Filters: Toggle options for Last Seen, Valid From, and Valid Until

...

    • dates.

Actions Available for Each Issue:

  • Remove Recast: Undo any recast settings applied to an issue.

  • Revert issue Issue to Vulnerable: Change the status back to vulnerable if it has been altered.

  • Edit Issue: Modify the details or status of an issue.

  • View Issue: Inspect the specific details of an issue.

  • View Parent Issue: Access the original issue if the current one is a derivative.

Streamlining Issue Management:

The Issue Rules feature on the Platform enhances your ability to track and manage the status of issues efficiently. With easy access to review, edit, or revert changes, you can ensure that issue management aligns with your current cybersecurity strategies and needs.

Suggested related articles:

Recast an Issue

Risk Acceptance

Suppress an Issue