What is an
SaaS Security API identifies and sets the state and category for each incident discovered during the scanning of your assets.
An incident is a record you can use to track a policy violation in a managed SaaS application. SaaS Security API identifies incidents when it finds a violation of Asset rules or Security Control rules against default policy rules and any custom rules you have defined. The service detects these incidents by scanning all assets in your managed SaaS applications and matches the file and folder metadata, associated collaborators, and the content of the files against your active policy rules or the configuration.
For each incident, you can determine whether it indicates a regulatory non-compliance, or if it compromises the security of your proprietary data or intellectual property.
Some examples of incidents include:
- AWS keys that have not been rotated in 3 months.
- Files WildFire has classified as malware.
- Passwords that do not meet the minimum complexity requirements.
- A document or folder containing sensitive data (such as credit card or social security numbers, secret code names, or source code) shared with an external user or contains a public link.
- Assets users have shared with external domains or collaborators or are directly accessible through a public link or vanity URL.
- Forwarding a corporate email containing sensitive data to a personal email domain.
SaaS Security API provides the following default
SaaS Security API automatically assigns all incidents as
Newand needs assessment. You cannot manually assign an incident from another state to New.
The incident investigation is
In Progress, but not closed. The assigned administrator is actively working to assess and resolve the incident.
Pendingaction to take place before you can assess, investigate, or remediate the incident. Action can be information from an asset owner or a dependency on another stakeholder in your organization.
No Reasonfound for the reported incident.
Business Justifiedbecause an asset owner’s job responsibilities necessitate the specific user behaviors identified in the policy or because the incident was triggered as part of testing you performed in the process of fine-tuning your policies.
Misidentifiedas a data pattern match or policy violation.
When an asset changes such that a policy violation no longer exists, SaaS Security API closes the incident and assigns
In The Cloud. You cannot manually assign an incident from another state to
In The Cloud.
When an asset is quarantined during automatic remediation, SaaS Security API resolves this incident and assigns
Aperture. You cannot manually assign an incident from another state to
SaaS Security API was originally named Aperture. However, the SaaS Security web interface maintains this status to support any incidents with this status.
See Assess New Incidents for information on how to review and resolve these issues.
Recommended For You
Recommended videos not found.