doc/user/application_security/triage/_index.md
Triage is the second phase of the vulnerability management lifecycle: detect, triage, analyze, remediate.
Triage is an ongoing process of evaluating each vulnerability to decide which need attention now and which are not as critical. High-risk vulnerabilities are separated from medium or low risk threats. It may not be possible or feasible to analyze and remediate every vulnerability. As part of a risk management framework, triage helps ensure resources are applied where they're most effective. It's best to triage vulnerabilities often, so that the number of vulnerabilities per triage cycle is small and manageable.
The objective of the triage phase is to either confirm or dismiss each vulnerability. A confirmed vulnerability continues to the analysis phase but a dismissed vulnerability does not.
Use the data contained in the security dashboard, the security inventory, and the vulnerability report to help triage vulnerabilities efficiently and effectively.
The scope of the triage phase includes all vulnerabilities that have not yet been assessed.
Filter the vulnerability report to identify vulnerabilities needing triage:
You should conduct vulnerability triage according to a risk assessment framework. Depending on your industry or geographical location, compliance with a framework might be required by law. If not, you should use a respected risk assessment framework, for example:
If available, use the Security Analyst Agent to accelerate your vulnerability analysis. The agent efficiently triages, assesses, and remediates security findings by providing insights, risk assessments, and remediation guidance.
Generally, the amount of time and effort spent on a vulnerability should be proportional to its risk. For example, your triage strategy might be that only vulnerabilities of critical and high risk continue to the analysis phase and the remainder are dismissed. You should make this decision according to your risk threshold for vulnerabilities.
After you triage a vulnerability you should change its status to either:
When you dismiss a vulnerability you must provide a brief comment that states why it has been dismissed. Dismissed vulnerabilities are ignored if detected in subsequent scans. Vulnerability records are permanent but you can change a vulnerability's status at any time.
Try these strategies to focus on the most important vulnerabilities first.
Prioritize vulnerabilities according to their risk.
Bulk triage low-risk vulnerabilities to focus on the most important ones.