What is an Incident?

SaaS Security API identifies and sets the state and category for each incident discovered during the scanning of your assets.
An incident is a record you can use to track a policy violation in a managed SaaS application. SaaS Security API identifies incidents when it finds a violation of Asset rules or Security Control rules against default policy rules and any custom rules you have defined. The service detects these incidents by scanning all assets in your managed SaaS applications and matches the file and folder metadata, associated collaborators, and the content of the files against your active policy rules or the configuration.
For each incident, you can determine whether it indicates a regulatory non-compliance, or if it compromises the security of your proprietary data or intellectual property.
Some examples of incidents include:
  • AWS keys that have not been rotated in 3 months.
  • Files WildFire has classified as malware.
  • Passwords that do not meet the minimum complexity requirements.
  • A document or folder containing sensitive data (such as credit card or social security numbers, secret code names, or source code) shared with an external user or contains a public link.
  • Assets users have shared with external domains or collaborators or are directly accessible through a public link or vanity URL.
  • Forwarding a corporate email containing sensitive data to a personal email domain.
SaaS Security API provides the following default
You cannot delete, or rename default or custom categories.
Incident State
Incident Category
SaaS Security API automatically assigns all incidents as
and needs assessment. You cannot manually assign an incident from another state to New.
The incident has been
to another administrator. To Assign Incidents to Another Administrator, select an admin from
Assigned To
The incident investigation is
In Progress
, but not closed. The assigned administrator is actively working to assess and resolve the incident.
action to take place before you can assess, investigate, or remediate the incident. Action can be information from an asset owner or a dependency on another stakeholder in your organization.
No Reason
found for the reported incident.
Business Justified
because an asset owner’s job responsibilities necessitate the specific user behaviors identified in the policy or because the incident was triggered as part of testing you performed in the process of fine-tuning your policies.
as a data pattern match or policy violation.
When an asset changes such that a policy violation no longer exists, SaaS Security API closes the incident and assigns
In The Cloud
. You cannot manually assign an incident from another state to
In The Cloud
When an asset is quarantined during automatic remediation, SaaS Security API resolves this incident and assigns
. You cannot manually assign an incident from another state to
SaaS Security API was originally named Aperture. However, the SaaS Security web interface maintains this status to support any incidents with this status.
See Assess New Incidents for information on how to review and resolve these issues.

Recommended For You