Suppressions

Last updated: December 23, 2025

Suppressions in Cyrisma provide a controlled way to acknowledge and temporarily accept identified risk without performing remediation. Suppression is not a form of patching or mitigation. Instead, it represents a deliberate risk acceptance decision that removes findings from future scan results for a defined period.

This article explains how suppressions work, where they apply, and how they differ from mitigation and remediation workflows.


What Suppression Is (and Is Not)

Suppression is:

  • A temporary exclusion of specific findings from scan results

  • A way to manage known, accepted, or compensating-risk scenarios

  • Time-bound and reviewable

Suppression is not:

  • Remediation or fixing an issue

  • Automatic risk reduction

  • A replacement for patching or mitigation plans

Suppressions do not change system state. They only affect how findings are reported.


Types of Suppressions

Cyrisma supports two primary suppression categories, aligned to scan types.

Vulnerability Suppressions

Vulnerability suppressions can apply to:

  • CVEs

  • Open ports

  • Regulatory or compliance-related findings detected during vulnerability scans

These suppressions prevent the specified findings from appearing in future vulnerability scan results for the suppression duration.

Secure Baseline Suppressions

Secure Baseline suppressions apply to:

  • Individual configuration benchmarks

  • Policy or hardening controls within a secure baseline

These suppressions prevent the benchmark from appearing as non-compliant in future baseline scans.


Local vs Global Suppressions

Suppressions can be applied at two scopes.

Local suppressions:

  • Apply to a single host or target

  • Used when a finding is acceptable only on a specific system

  • Common for legacy systems or specialized workloads

Global suppressions:

  • Apply across all hosts within an instance

  • Used when a finding is intentionally accepted environment-wide

  • Reduce repetitive remediation or mitigation effort

Scope selection should reflect the true risk acceptance boundary.


How Suppressions Are Created

Suppressions can be created in two contexts.

From scan results:

  • Findings can be suppressed directly from scan history

  • This immediately excludes the item from future scans

From mitigation plans:

  • Suppression can be selected as an action when working within a mitigation plan

  • This documents risk acceptance as part of the mitigation workflow

Both methods result in the same suppression behavior.


Suppression Duration and Expiration

Suppressions are always time-bound.

The suppression duration is configured at the system level and applies to all suppressions within the instance.

Available durations:

  • 30 days

  • 60 days

  • 90 days

Once the suppression expires:

  • The finding reappears in future scans if still present

  • The item becomes eligible again for mitigation plans or remediation

This ensures suppressions are reviewed regularly and do not become permanent risk blind spots.


Impact on Scans and Mitigation Plans

Suppressed items:

  • Do not appear in future scan results while active

  • Are not included in new mitigation plans

  • Do not generate new mitigation workload

Existing mitigation plans:

  • Are not retroactively updated

  • Remain based on the original scan snapshot

If a suppression expires and the issue still exists, it will re-enter the remediation and mitigation workflow through new scans.


Suppression vs Mitigation vs Patching

Each represents a distinct decision path.

Suppression:

  • Accepts risk temporarily

  • Does not change system configuration

  • Requires periodic review

Mitigation plans:

  • Track and document actions taken against scan findings

  • Are static and scan-based

  • Do not auto-update after remediation

Patching and remediation:

  • Change system state

  • Address root causes directly

  • Require re-scanning to reflect improvement

Understanding these differences prevents misuse and ensures accurate risk reporting.


Summary

Suppressions in Cyrisma provide a structured, time-bound way to accept risk without remediation. By clearly separating suppression from patching and mitigation, Cyrisma ensures that risk acceptance remains intentional, visible, and reviewable rather than implicit or permanent.