The Findings feature in the FireTail platform helps detect known API security issues and align with best practices from various API security frameworks, including:
By identifying these vulnerabilities, you can address issues such as broken authentication, mass assignment, and security misconfiguration and so on.
Findings can be generated through several methods, known as Events:
The backend events processor evaluates whether the criteria for a finding are met. A single event can trigger multiple findings.
To view findings, navigate to Posture Management and select the Findings tab.
The findings page displays the total number of findings within each severity category. These categories are:
Select a severity, or multiple severities to view findings with the selected severities.
To view findings for a specific framework, select the required framework or frameworks.
Click Download to download a CSV file of the findings data. Learn more about how to download.
Use the Filter function to view findings on the platform that match the criteria of your filter. Click Add Filter and select the filter type:
Select field - In the select field dropdown you can choose to filter by:
Apply the Operator and select the appropriate Value. Click Submit.
Use this fto filter for findings created in the time period selected.
Click Download to download a CSV file of the Findings data. Learn more about how to download.
Each finding is tagged with a severity. You can redefine the default severity of the finding. The severities to choose from are:
Each finding is tagged with a severity. You can redefine the default severity of the finding
The default status of a finding is Open, you can change the status of the finding.
If you mark a finding as Risk Accepted, Ignored, or False Positive, our system will not trigger the finding again if it is rediscovered in future scans. However, if you mark a finding as Remediated, it will be reopened if the same issue is discovered again during subsequent scans.
Click on a finding to view additional details, including why it was discovered and where in the specification file the issue occurred, if applicable.
Assess your business needs before applying any remediation suggestions.
Address the security issues by following the recommended steps.
The findings page also indicates which security frameworks correspond to each finding.