Issues

On this page you will see a list of all open issues across your integrated SaaS applications, apart from showing the issues list, this table hold very important and easy to access information, Here is a breakdown of all the information the applications table includes:

i. Rule Name This column holds the names of all types of rules.

ii. Applications The application/s for which the rule executes. Note that all rules do not run for all applications and this is depends on application developer.

iii. Frameworks The applicable compliance frameworks applicable to this rule amongst the followed frameworks.

iv. Issues This column holds the total number of occurrences of issue amongst all integrated instances of applications.

iv. Passed Checks This column tell percentage of occurances passing the rule conditions - secure coverage.

v. Updated This column holds the last timestamp on which there was some activity (open or resolve) on the issue. vi. Enable Rules can be set to be evaluated for your SaaS estate (Enabled state). Rules are enabled by default.

There are multiple filters available to skim through Rules:

  • Rule Type: You can choose to view rules among one or many of the following types:

    • Misconfigurations

    • Identity

    • Shadow Applications

    • Data

  • Severity:

    You can choose to view rules among one or many of the following severities:

    • Critical

    • High

    • Medium

    • Low

  • Risk: You can choose to view rules among one or many of the following security domains:

    • Access Control

    • Data Leakage Protection

    • Malware Protection

    • Phishing Protection

    • Privacy Control

    • Spam Protection

    • System Integrity Protection

    • User Account Protection

  • Is Starred: You can choose to view rules either starred or not starred.

  • Compliance: You can choose to view rules among followed compliances.

  • Customization Rules: A few rules allow users to enable customization. As an example, you may wish to create two version of password strength rule depending on minimum length of password allowed.

When clicked a rule, a side drawer will appear, this contains detailed information about the rule.

  1. Issues

  2. Details

  3. Notifications

  4. Automation

  5. Remediations

  6. Compliance

  7. Logs

Last updated