Findings
The Findings page is where you review individual security issues discovered during a scan. Each finding represents a specific check that passed or failed against a resource in your cloud environment.What a finding contains
| Field | Description |
|---|---|
| Check title | What was evaluated (e.g., “Ensure Web App is using the latest version of TLS encryption”) |
| Status | PASS, FAIL, WARN, or MANUAL |
| Severity | Critical, High, Medium, Low, or Informational |
| Resource | The affected cloud resource (name and ID) |
| Region | Where the resource is located |
| Remediation | Step-by-step instructions, CLI commands, and Terraform references to fix the issue |
| Compliance | Which frameworks this check maps to (CIS, SOC2, PCI-DSS, etc.) |
| Risk | Business impact description of the misconfiguration |
Browsing findings
The findings table displays results in a paginated view with these controls:- Search — Find findings by check name or resource
- Filter by status — Show only FAIL or PASS results
- Filter by severity — Focus on Critical, High, Medium, Low, or Informational
- Filter by service category — Narrow to specific services (Storage, Compute, Networking, etc.)
- Filter by scope/account — Focus on a specific subscription or account
- Sort — By severity (default) or by resource count
Finding details
Click any finding to open the details panel, which shows:- Full check description and risk assessment
- Remediation guidance with CLI commands and step-by-step instructions
- Compliance framework mappings
- Resource metadata (name, region, account)
Actions on findings
From the findings view you can:- Mute a finding — Suppress it as an accepted risk (learn more)
- Ask the AI assistant — Select findings to add them as context for the chat assistant (learn more)
- Export PDF — Download all findings as a PDF report (learn more)