Print
Print:
Summary
Body
Cyrisma Mitigation Review Process
Summary
This article outlines the process for reviewing a Cyrisma mitigation plan.
Body
Ov
erview
This article outlines the process for reviewing a Cyrisma mitigation plan. Cyrisma is a CCSI SIEM tool utilized to improve organizational security.
Instructions
Access the CCSI
Cyrisma
site.
Enter the credentials provided to you by CCSI IT and click
"Login"
:
Click
"Close"
on the Cyrisma usage warning:
Locate your assigned mitigation plan and select the
"Details View"
button on the right hand side:
Review each item individually by clicking the
"Review & Perform an Action"
button on the right hand side:
Review the item details:
Note the following:
File Name
Location
- Where the file is stored.
Sensitive Data Type
- Data type classification.
Context Found
- The exact data identified by the scan.
After the item has been reviewed select the "Actions to be Taken" drop down and select one of the following:
Mark as False Positive
- Use this if the context found does not match the sensitive data type.
Move to a Secure Location
- Use this if the file has been moved off the device/workstation to another location (not copied).
Delete
- Use this if the file/item has been deleted.
Select the "
Submit Button"
Repeat these steps until all identified items are mitigated and the plan is 100% complete.
Notify
CCSI IT
if there are any questions or concerns.
Details
Details
Article ID:
137307
Created
Wed 3/30/22 11:07 PM
Modified
Thu 3/31/22 10:48 AM