Mitigation & Remediation in Cyrisma
Last updated: December 23, 2025
Mitigation and remediation in Cyrisma are designed to help organizations reduce risk in a controlled, auditable, and repeatable manner. Rather than relying on a single remediation mechanism, Cyrisma provides multiple, intentionally distinct paths for addressing risk—each serving a different operational or governance purpose.
This article explains:
What remediation means in Cyrisma
The remediation mechanisms available
How mitigation plans, patching, and suppressions differ
Why these mechanisms are intentionally decoupled
How to choose the appropriate remediation approach
This article serves as the conceptual foundation for all mitigation- and remediation-related documentation in the Cyrisma Knowledge Base.
What Remediation Means in Cyrisma
In Cyrisma, remediation is the act of addressing risk identified by scans. Risk may originate from:
Vulnerable software
Insecure system configurations
Sensitive data exposure
Non-compliant security settings
Remediation does not always mean immediate technical change. In practice, remediation may involve:
Applying patches
Correcting configuration issues
Securing, encrypting, or removing sensitive data
Tracking remediation work for accountability
Accepting or suppressing risk when appropriate
Cyrisma supports these outcomes through three distinct remediation mechanisms.
The Three Remediation Paths
Patch Manager (Direct Remediation)
Patch Manager is Cyrisma’s execution layer for remediation.
It is used to:
Apply patches for supported third-party applications
Apply Windows KB updates
Remediate certain security configuration findings
Key characteristics:
Executes remediation actions directly on endpoints through agents
Relies on scan results to determine applicable patches
Operates independently of mitigation plans
Does not modify historical scan results
Patch Manager is best suited for technical remediation where changes can be applied automatically or at scale.
Mitigation Plans (Governance and Tracking)
Mitigation Plans provide a structured way to manage, assign, and document remediation efforts based on scan results.
They are used to:
Assign ownership for remediation activities
Track actions taken against vulnerabilities, configurations, or data findings
Document remediation decisions and outcomes
Provide audit and compliance evidence
Key characteristics:
Created from completed scan results
Scan-based and static by design
Require users to explicitly document actions taken
Automatically complete once all items are addressed
Mitigation plans are intentionally decoupled from execution. This allows organizations to track remediation work regardless of how the fix was performed, whether through Patch Manager, manual changes, or external tooling.
Suppressions (Risk Acceptance)
Suppressions represent a formal decision to exclude specific findings from future scan results for a defined period.
They are used when:
A finding is expected or acceptable
A risk cannot be remediated immediately
A finding is not relevant in a specific context
Key characteristics:
Can be applied locally (per host) or globally (per instance)
Have a configurable expiration period (30, 60, or 90 days)
Remove suppressed items from future scan results
Can be applied directly from scan results or within mitigation plans
Suppressions are not remediation. They are a documented form of risk acceptance.
Why These Mechanisms Are Intentionally Decoupled
Cyrisma separates execution, tracking, and risk acceptance to ensure accuracy, accountability, and auditability.
Key design principles:
Scan results are immutable
Historical scans represent a point-in-time snapshot and are never modified after remediation occursPatching does not automatically close mitigation plans
Remediation actions must be explicitly documented by the user responsible for the mitigation planGovernance must not rely solely on automation
Mitigation plans exist to provide ownership, evidence, and accountability even when remediation occurs outside Cyrisma
This design prevents false assumptions about remediation status and ensures reliable historical records.
Choosing the Right Remediation Path
Scenario | Recommended approach |
Patchable third-party software | Patch Manager |
Windows operating system updates | Patch Manager |
Tracking remediation work | Mitigation Plans |
Sensitive data remediation | Mitigation Plans |
File-level remediation | Mitigation Plans (Local Data) |
Accepting known or temporary risk | Suppressions |
Audit or compliance evidence | Mitigation Plans |
In many environments, multiple approaches are used together. For example:
Apply a patch using Patch Manager
Document the remediation in a mitigation plan
Temporarily suppress a finding while remediation is pending
Summary
Cyrisma provides a flexible, auditable remediation framework built on three core mechanisms:
Patch Manager for direct remediation
Mitigation Plans for governance and tracking
Suppressions for controlled risk acceptance
Understanding how these mechanisms work together, and why they are intentionally separate, is essential for accurately managing risk and maintaining a defensible security posture in Cyrisma.