Mitigation Plans: Concepts and Scope
Last updated: December 23, 2025
Mitigation Plans in Cyrisma provide a structured way to document, assign, and track remediation efforts based on scan results. They function as a governance and workflow layer rather than an automated remediation engine.
This article explains what mitigation plans are, which scan types they support, how they behave over time, and what they intentionally do not do.
What Mitigation Plans Are
A mitigation plan is a scan-derived record used to track how identified risks are being addressed. It captures the state of findings at a specific point in time and assigns responsibility for managing those findings.
Mitigation plans are designed to support:
Accountability for remediation activities
Documentation of decisions and actions taken
Progress tracking over a defined time window
Audit and review of risk handling
They are not designed to dynamically remediate issues or reflect real-time system state.
Scan-Based and Static by Design
Mitigation plans are created from completed scan results and are static once created.
Key characteristics:
A mitigation plan represents the findings from a specific scan
Findings do not change after the plan is created
New scans do not update existing mitigation plans
Remediation actions taken outside the plan are not automatically reflected
If remediation occurs after a mitigation plan is created, the results of that remediation are only visible in subsequent scans, not retroactively in the existing plan.
This design ensures mitigation plans remain a reliable historical record of what was identified and how it was handled at that time.
Supported Scan Types
Mitigation plans can be created from the following scan types.
Vulnerability Scans
Vulnerability-based mitigation plans are target-based and root-cause driven.
They are used to track actions taken against:
CVEs
Vulnerable software
Patchable and non-patchable root causes
These plans focus on documenting remediation decisions rather than executing fixes.
Secure Baseline Scans
Secure baseline mitigation plans are target-based and configuration-driven.
They are used to track handling of:
Configuration misalignments
Policy deviations
Secure baseline benchmark findings
They support documenting exceptions, compensating controls, or configuration changes made outside the platform.
Data Sensitivity Scans
Data sensitivity mitigation plans are file- and folder-based.
They are used to manage:
Sensitive data findings
File-level remediation actions
Ownership and responsibility for data handling
Data sensitivity mitigation plans uniquely support sub-mitigations, allowing work to be divided across multiple assignees.
What Mitigation Plans Do Not Do
Mitigation plans intentionally do not function as an automated remediation system.
They do not:
Automatically patch systems
Automatically remediate vulnerabilities
Update based on future scans
Reflect live system state
Automatically close when remediation occurs outside the plan
They are not a replacement for Patch Manager or agent-based remediation.
Relationship to Patching and Remediation
Patching and mitigation plans are conceptually related but operationally separate.
Patch Manager performs direct remediation on supported software
Mitigation plans track and document remediation decisions
Patching actions do not automatically update mitigation plans
Users may document patching activity manually within a mitigation plan
This separation is intentional. Mitigation plans serve as a governance and tracking mechanism, while Patch Manager serves as a remediation engine.
Why Mitigation Plans Do Not Auto-Update
Mitigation plans are based on static scan data to preserve integrity and auditability.
Automatically updating plans after patching or rescanning would:
Alter historical records
Obscure what was originally identified
Reduce clarity for audits and reviews
Instead, Cyrisma relies on new scans to reflect the current security posture, while mitigation plans preserve the decision-making trail tied to earlier findings.
Summary
Mitigation plans in Cyrisma provide a structured, scan-based method for tracking how risks are handled across vulnerability, secure baseline, and data sensitivity findings. They are static by design, intentionally decoupled from automated remediation, and focused on accountability and documentation rather than execution.
They should be used alongside Patch Manager and ongoing scanning to support a complete remediation lifecycle.