-
I have not been able to find any documentation on how the severity for each check, regardless of the provider, is determined, is that something that is provided somewhere? I noticed a previous discussion mentioned "We use a combination of the CVSS 3.0 (https://www.first.org/cvss/calculator/3.0) and the context of the check inside AWS to set the severity.", but that was from 2022, so I wasn't sure if that was still the case. Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 6 replies
-
Hello @esell, currently our definition for each severity level is as follows: Critical – The issue should be remediated immediately to avoid it escalating. High – The issue must be addressed as a near-term priority. Medium – The issue should be addressed as a mid-term priority. Low – The issue does not require action on its own. Informational – No configuration weakness was found. We will add this to our public documentation. Please let us know if you have found it helpful. Thanks! |
Beta Was this translation helpful? Give feedback.
We determine the severity using a mix of CVSS, the maintainers knowledge about the provider, the affected resource and the security check and also the above severity definition. Mixing these three is how we define the check's severity. However, there are some cases where we override the severity to a higher one if the context of the resource indicates a higher risk.