Remediation Workflow Example
This guide walks through a complete remediation workflow, from discovering a security finding to deploying the fix via pull request.What You'll Learn
- Identify security findings in your infrastructure
- Analyze the root cause and impact
- Generate automated fixes with AI
- Validate fixes before deployment
- Deploy through pull request workflow
Scenario
You’ve received an alert that an S3 bucket is missing encryption. Let’s walk through the complete remediation process.Step 1: Identify the Finding
View in Dashboard
- Navigate to Findings in Cloudgeni
- Filter by:
- Severity: High
- Status: Open
- Type: Static Analysis
Finding Details
Current Code (Non-Compliant)
Step 2: Analyze the Finding
Why This Matters
- Compliance: SOC 2 (CC6.7), ISO 27001 (A.8.24) require encryption
- Security: Unencrypted data is vulnerable if bucket is accessed
- Risk Level: High - data could be exposed in plaintext
Impact Assessment
| Factor | Assessment |
|---|---|
| Data Sensitivity | Contains customer data |
| Exposure Risk | If accessed, data is readable |
| Compliance Impact | SOC 2 audit finding |
| Remediation Complexity | Low - configuration change |
Step 3: Generate the Fix
Option A: One-Click Remediation
- Click Remediate on the finding
- Cloudgeni generates the fix automatically
- Review the proposed changes
Option B: AI DevOps Agent
For more control:- Open AI DevOps session
- Request: “Fix the S3 encryption finding for data_bucket”
- Agent generates comprehensive fix with explanation
Generated Fix
Cloudgeni generates the following Terraform code:Step 4: Review the Fix
Code Review Checklist
Before applying, verify:- Encryption algorithm is appropriate (AES256 or aws:kms)
- KMS key has rotation enabled
- No breaking changes to existing resources
- Variables and naming follow conventions
- Dependencies are correctly referenced
Diff View
Step 5: Validate the Fix
Cloudgeni Validation
Click Validate to run automated checks:-
Syntax Validation
-
Policy Check
-
Plan Preview
External Validation (Optional)
If configured, Cloudgeni triggers your CI/CD pipeline:Step 6: Create Pull Request
PR Creation
- Click Create Pull Request
- Configure:
- Branch name:
fix/s3-encryption-ckv-aws-19 - Target branch:
main
- Branch name:
- Review auto-generated description
- Click Create
Generated PR
Step 7: Review and Merge
Code Review
Your team reviews the PR:- Verify encryption configuration is correct
- Check KMS key settings
- Confirm no unintended changes
- Approve the PR
Merge
- Merge the pull request
- CI/CD pipeline applies changes
- Cloudgeni detects the merge
Step 8: Verify Resolution
Automatic Re-scan
After merge, Cloudgeni automatically:- Detects changes to repository
- Runs new security scan
- Updates finding status
Verification
Updated Compliance Score
Timeline Summary
| Step | Action | Time |
|---|---|---|
| 1 | Finding identified | T+0 |
| 2 | Analysis complete | T+5min |
| 3 | Fix generated | T+6min |
| 4 | Review complete | T+10min |
| 5 | Validation passed | T+12min |
| 6 | PR created | T+13min |
| 7 | PR merged | T+30min |
| 8 | Resolution verified | T+35min |
Best Practices
Before Remediation
- Understand the finding’s impact
- Check if compensating controls exist
- Coordinate with affected teams
During Remediation
- Review all generated code
- Test in non-production first
- Document any manual steps
After Remediation
- Verify fix with new scan
- Update related documentation
- Share learnings with team