Enterprise Software Supply Chain Manager (ESSCM)
Findings
View and manage all security findings across policies and gates
Findings
The Findings tab consolidates all security issues discovered during analysis, including policy violations, gate failures, and other actionable findings.
Overview
Findings provide a unified view of:
- Security policy violations
- Gate check failures
- Configuration issues
- Compliance gaps
- Best practice recommendations
Finding Types
Security Findings
| Type | Description | Severity |
|---|---|---|
| Vulnerability | Known CVE in component | Based on CVSS |
| Malicious Package | Potentially malicious component | Critical |
| Supply Chain Risk | Attestation or provenance issue | High-Critical |
| Secret Exposure | Credentials in code/config | Critical |
Policy Findings
| Type | Description | Severity |
|---|---|---|
| License Violation | Prohibited license detected | Medium-High |
| Version Violation | Version policy not met | Low-Medium |
| Age Violation | Component too old | Medium |
| Maintenance Issue | Abandoned dependency | Medium |
Compliance Findings
| Type | Description | Severity |
|---|---|---|
| SBOM Incomplete | Missing required data | Medium |
| EO 14028 Gap | Federal compliance issue | High |
| NTIA Element Missing | Minimum element absent | Medium |
Viewing Findings
Findings Tab
- Open project
- Navigate to Findings tab
- View all findings for the project
Finding Card
Each finding displays:
| Field | Description |
|---|---|
| Title | Brief description |
| Type | Category of finding |
| Severity | Critical/High/Medium/Low |
| Status | Open/Resolved/Mitigated |
| Affected Component | Component(s) involved |
| Gate | Which gate caught this |
| First Seen | When first detected |
Filtering and Sorting
Filter Options
| Filter | Options |
|---|---|
| Severity | Critical, High, Medium, Low |
| Type | Vulnerability, Policy, Compliance |
| Status | Open, Resolved, Mitigated |
| Gate | Specific policy gate |
| Component | Specific component |
Sort Options
- Severity (highest first)
- Date discovered (newest first)
- Component name
- Status
Finding Details
Click a finding for full details:
Detail View
| Section | Contents |
|---|---|
| Summary | Issue description and context |
| Impact | What this finding means |
| Evidence | How it was detected |
| Recommendations | How to resolve |
| References | Related CVEs, articles |
| History | Timeline of changes |
Actions
From the detail view:
- Resolve - Mark as fixed
- Mitigate - Add mitigation
- Suppress - Hide from view
- Assign - Assign to team member
- Export - Export finding data
Managing Findings
Status Workflow
Open → In Progress → Resolved
↓ ↓
Mitigated SuppressedBulk Actions
Select multiple findings to:
- Change status
- Assign to user
- Add to sprint/ticket
- Export selected
- Bulk mitigate
Assignment
Assign findings to team members:
- Select finding(s)
- Click Assign
- Select team member
- Add optional note
- Assignee receives notification
Gate Integration
Findings relate to policy gates:
Gate Status
| Status | Meaning |
|---|---|
| Pass | No findings violate gate |
| Fail | Findings exceed gate threshold |
| Warning | Findings present but below threshold |
Viewing Gate Results
- Go to Policies & Gates
- See overall gate status
- Click gate for related findings
Notifications
Alert Configuration
Configure alerts for findings:
- Go to Settings → Notifications
- Set finding alert rules
- Choose delivery method
Alert Triggers
| Trigger | Description |
|---|---|
| New Critical | Any new critical finding |
| New High | New high severity finding |
| Threshold | Finding count exceeds limit |
| Gate Failure | Security gate fails |
Reports
Findings Report
Generate findings reports:
- Click Export → Findings Report
- Select filters and date range
- Choose format
- Download report
Report Contents
- Executive summary
- Findings by severity
- Findings by type
- Resolution status
- Trend analysis
- Recommendations
API Access
# List findings for a project
curl -X GET "https://api.safeguard.sh/v1/projects/{id}/findings?severity=critical,high" \
-H "Authorization: Bearer $API_KEY"
# Get finding details
curl -X GET https://api.safeguard.sh/v1/findings/{finding_id} \
-H "Authorization: Bearer $API_KEY"
# Update finding status
curl -X PATCH https://api.safeguard.sh/v1/findings/{finding_id} \
-H "Authorization: Bearer $API_KEY" \
-d '{"status": "resolved"}'Integration with Issue Trackers
Export findings to external systems:
| Integration | Actions |
|---|---|
| JIRA | Create issues, sync status |
| GitHub Issues | Create/link issues |
| Azure DevOps | Create work items |
| ServiceNow | Create incidents |
See JIRA Integration for details.
Best Practices
Triage
- Review critical findings daily
- Triage high findings weekly
- Have clear ownership
- Set SLAs by severity
Resolution
- Fix critical findings immediately
- Document mitigations properly
- Verify fixes with rescans
- Track resolution metrics
Prevention
- Enable security gates
- Review findings in PRs
- Train team on common issues
- Improve processes based on patterns