Security Incidents¶
The incident management module tracks security events from initial report through investigation, resolution, and post-incident review.
Reporting an incident¶
- Navigate to Security → Incidents.
- Click Report Incident.
- Provide:
- Title and description — what happened.
- Severity — Critical, High, Medium, Low.
- Affected systems — link assets, services, or users impacted.
- Assignee — the person responsible for investigation.
Incident timeline¶
Every incident has a timeline (IncidentTimelineEvent) that tracks the investigation:
- Add timeline entries as the investigation progresses.
- Each entry records the action taken, who took it, and when.
- The timeline provides a chronological audit trail of the response.
Post-incident review¶
After resolution:
- Click Create Post-Incident Review on the incident detail page.
- Document root cause, contributing factors, and lessons learned.
- Link follow-up actions: new risks, policy updates, configuration changes.
- The
PostIncidentReviewrecord is permanently linked to the incident.
Linking incidents¶
Incidents can be linked to:
- Risks — an incident may validate a previously identified risk or create a new one.
- Compliance controls — incident response demonstrates control effectiveness.
- Assets and services — affected infrastructure.
- UAR findings — an access-related incident may originate from a UAR finding.