Skip to content

Commit c98abd3

Browse files
authored
update finding_status_definitions (#14356)
1 parent 24369ac commit c98abd3

1 file changed

Lines changed: 49 additions & 0 deletions

File tree

docs/content/triage_findings/findings_workflows/finding_status_definitions.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,3 +89,52 @@ If you have a testing and remediation effort related to a specific aspect of you
8989
Once you’ve reviewed a Finding, you might discover that the vulnerability reported does not actually exist. The False Positive status will be maintained by reimport and prevent matching findings from being opened or closed, which assists with noise reduction.
9090

9191
If a different scanning tool finds a similar Finding, it will not be recorded as a False Positive. DefectDojo can only compare Findings within the same tool to determine if a Finding has already been recorded.
92+
93+
## Severity vs Risk
94+
Severity reflects the technical impact of an issue if exploited. Risk reflects the business urgency and required response, factoring in context such as exposure, exploitability, compensating controls, and operational impact.
95+
96+
97+
## Risk Level Definitions
98+
### Urgent
99+
A finding that represents an immediate and unacceptable business risk.
100+
101+
High likelihood of exploitation or active exploitation observed
102+
Direct exposure of critical systems, sensitive data, or customer environments
103+
Limited or no compensating controls
104+
Failure to act could result in severe business disruption, regulatory impact, or reputational damage
105+
106+
Expected action: Immediate response Typical SLA: Emergency remediation
107+
108+
109+
### Needs Action
110+
A finding that poses a clear and actionable risk requiring timely remediation or mitigation.
111+
112+
A realistic attack path exists
113+
The affected asset is exposed, business-critical, or customer-facing
114+
Compensating controls are weak, missing, or unverified
115+
Exploitation would result in measurable business, security, or compliance impact
116+
117+
Expected action: Active remediation or mitigation required Typical SLA: Short-term remediation window
118+
119+
120+
### Medium Risk
121+
A finding that presents a moderate level of business risk and should be remediated in a planned timeframe.
122+
123+
Meaningful impact could occur if exploited
124+
Some exposure exists, but exploitation requires specific conditions or privileges
125+
May affect production systems or customer data indirectly
126+
Often aligns with medium or high severity issues without immediate exploitability
127+
128+
Expected action: Prioritized remediation Typical SLA: Planned remediation window
129+
130+
131+
### Low Risk
132+
A finding that presents minimal business impact and does not require immediate action.
133+
134+
No known exploitation in the wild
135+
Limited or no exposure (e.g., internal systems, non-production, strong compensating controls)
136+
Remediation can be addressed as part of normal development or maintenance cycles
137+
Often informational or low-severity findings, but may include higher-severity issues that are well-mitigated
138+
139+
Expected action: Track and address opportunistically Typical SLA: Best effort / backlog
140+

0 commit comments

Comments
 (0)