Skip to main content

Understanding Findings

Findings are security issues, misconfigurations, or policy violations detected by Cloudgeni. This guide explains the different types of findings, how they’re classified, and how to manage them effectively.

Finding Types

  • Static Analysis - Issues found in IaC code before deployment - Cloud Compliance - Violations detected in running cloud resources - Configuration Drift - Differences between IaC and actual state

Finding Types

Static Analysis Findings

Detected by scanning Infrastructure as Code files:
SourceDescription
Terraform.tf and .tfvars files
Bicep.bicep files
Terragruntterragrunt.hcl files
HCLGeneric HashiCorp Configuration Language
Example Finding:
Check: CKV_AWS_19
Title: Ensure S3 bucket has encryption enabled
File: storage/main.tf
Line: 15

Cloud Compliance Findings

Detected by scanning your actual cloud infrastructure:
ProviderSource
AWSSecurity Hub, Prowler scans
AzureDefender for Cloud
GCPSecurity Command Center
OCICloud Guard
Example Finding:
Check: aws_s3_bucket_encryption
Title: S3 bucket missing encryption
Resource: arn:aws:s3:::my-data-bucket
Region: us-east-1

Drift Findings

Detected when cloud resources don’t match IaC definitions:
TypeDescription
AddedResource exists in cloud but not in IaC
ModifiedResource configuration differs from IaC
DeletedResource in IaC but missing from cloud

Severity Levels

Critical

Immediate security risk requiring urgent action. Examples:
  • Publicly accessible databases
  • Unencrypted sensitive data stores
  • Admin credentials exposed
  • No authentication on APIs
Response: Address within 24 hours

High

Significant vulnerability that could be exploited. Examples:
  • Missing encryption at rest
  • Overly permissive IAM policies
  • Security groups allowing broad access
  • Missing MFA requirements
Response: Address within 7 days

Medium

Moderate risk that should be addressed. Examples:
  • Logging not enabled
  • Non-compliant naming conventions
  • Missing resource tags
  • Suboptimal configurations
Response: Address within 30 days

Low

Minor issues or best practice recommendations. Examples:
  • Deprecated resource versions
  • Non-standard configurations
  • Documentation gaps
  • Minor optimization opportunities
Response: Address within 90 days

Info

Informational notices, no immediate risk. Examples:
  • New features available
  • Upcoming deprecations
  • Configuration suggestions
  • Compliance notes
Response: Review as convenient

Finding Status

Status Values

StatusDescription
OpenFinding detected, not yet addressed
In ProgressRemediation work underway
ResolvedFinding fixed and verified
SuppressedAccepted risk with documentation
False PositiveFinding was incorrect

Status Workflow

          ┌─────────────┐
          │    Open     │
          └──────┬──────┘

        ┌────────┴────────┐
        ▼                 ▼
┌───────────────┐  ┌─────────────────┐
│  In Progress  │  │   Suppressed    │
└───────┬───────┘  │  (with reason)  │
        │          └─────────────────┘

┌───────────────┐
│   Resolved    │
└───────────────┘

Transitioning Status

Open → In Progress:
  • When remediation starts
  • When PR is created
  • When assigned to team member
In Progress → Resolved:
  • After fix is deployed
  • Verified by new scan
  • PR merged to main branch
Open → Suppressed:
  • Risk accepted by organization
  • Requires documented justification
  • Needs approval (configurable)

Finding Properties

Core Properties

PropertyDescription
IDUnique identifier
Check IDPolicy rule identifier (e.g., CKV_AWS_19)
TitleBrief description of the issue
DescriptionDetailed explanation
SeverityRisk level (Critical to Info)
StatusCurrent workflow status

Location Information

PropertyDescription
FileSource file path
LineLine number in file
ResourceResource name or ARN
RegionCloud region (for compliance findings)

Metadata

PropertyDescription
First SeenWhen finding was first detected
Last SeenMost recent scan that detected it
FrameworkCompliance framework (SOC2, ISO27001, etc.)
TagsUser-defined labels

Prioritization

Priority Matrix

Use severity and context to prioritize:
FactorHigher PriorityLower Priority
SeverityCritical, HighLow, Info
EnvironmentProductionDevelopment
Data SensitivityContains PII/secretsNo sensitive data
External ExposureInternet-facingInternal only
ComplianceRegulated workloadNon-regulated

Prioritization Strategy

  1. Critical in Production - Immediate action
  2. High in Production - This sprint
  3. Critical in Dev/Staging - Before promotion
  4. Medium/Low - Scheduled maintenance
  5. Info - Backlog review

Managing Findings

Filtering

Filter findings by:
  • Severity level
  • Status
  • Resource type
  • File/repository
  • Framework
  • Date range

Grouping

Group findings by:
  • Check ID (same type of issue)
  • Resource (all issues for one resource)
  • File (all issues in one file)
  • Severity

Bulk Actions

Perform actions on multiple findings:
  • Update status
  • Assign to team member
  • Bulk remediate
  • Export to CSV

Suppression

When to Suppress

Suppress findings when:
  • Risk is accepted by organization
  • Finding is a false positive
  • Compensating controls exist
  • Technical limitation prevents fix

Suppression Requirements

RequirementDescription
ReasonClear justification
ApproverWho approved the suppression
ExpirationOptional end date
Compensating ControlAlternative mitigation

Suppression Example

Finding: S3 bucket public access
Status: Suppressed
Reason: Bucket hosts public website assets
Approver: security@company.com
Expires: 2024-12-31
Compensating: CloudFront distribution with WAF

Integration with Workflows

Ticketing Integration

Export findings to:
  • Jira
  • ServiceNow
  • GitHub Issues
  • Azure DevOps Work Items

Notifications

Configure alerts for:
  • New critical findings
  • Finding status changes
  • Compliance score drops
  • Suppression requests

Reporting

Generate reports showing:
  • Finding trends over time
  • Remediation metrics
  • Team performance
  • Compliance status

Best Practices

Regular Review

  • Review new findings daily
  • Triage weekly with team
  • Audit suppressed findings quarterly
  • Track remediation metrics

Documentation

  • Document suppression reasons clearly
  • Link findings to related tickets
  • Note manual remediation steps
  • Record lessons learned

Continuous Improvement

  • Identify recurring issues
  • Create preventive policies
  • Automate common fixes
  • Share knowledge across teams