The Findings feature in the FireTail platform helps detect known API security issues and align with best practices from various API security frameworks, including:
By identifying these vulnerabilities, you can address issues such as broken authentication, mass assignment, and security misconfiguration and so on.
Findings can be generated through several methods, known as Events:
The backend events processor evaluates whether the criteria for a finding are met. A single event can trigger multiple findings.
To view findings, navigate to Posture Management and select the Findings tab.
The findings page displays the total number of findings within each severity category. These categories are:
Select a severity, or multiple severities to view findings with the selected severities.
To view findings for a specific framework, select the required framework or frameworks.
Click Download to download a CSV file of the findings data. Learn more about how to download.
Use the Filter function to view findings on the platform that match the criteria of your filter. Click Filters and apply one or more of the following filters:
Duration - this is the time from when the finding was created.
Select field - In the select field dropdown you can choose to filter by:
Click confirm to apply the filter parameters. The findings displayed reflects the parameters you have applied.
Each finding is tagged with a severity. You can redefine the default severity of the finding. The severities to choose from are:
Each finding is tagged with a severity. You can redefine the default severity of the finding
The default status of a finding is Open, you can change the status of the finding.
If you mark a finding as Risk Accepted, Ignored, or False Positive, our system will not trigger the finding again if it is rediscovered in future scans. However, if you mark a finding as Remediated, it will be reopened if the same issue is discovered again during subsequent scans.
Click on a finding to view additional details, including why it was discovered and where in the specification file the issue occurred, if applicable.
Assess your business needs before applying any remediation suggestions.
Address the security issues by following the recommended steps.
The findings page also indicates which security frameworks correspond to each finding.