Risk acceptance

You can accept the risks found by the solution taking into account the following:

You can accept risk in the following sections:

To accept risks, risk management rights are required.

To accept a risk based on image scan results:

  1. In the image scan results window, open the tab with information about the required threat type.
  2. In the table, select a threat and click the Accept button in the Risk acceptance column.
  3. In the window that opens, specify the risk acceptance parameters:
    • Select the extent of risk acceptance:
      • For the selected image with the detected risk;
      • For all images in the repository containing the image with the detected security threat;
      • For all images in which this security threat has been or will be detected.
    • Specify the period after which this security threat must be considered again when determining the image security status.
    • Specify the reason for risk acceptance.
  4. Click the Accept button.

The selected threat does not affect the security status of this specific image, images in the repository, or all images for the defined number of days (or for an unlimited term).

An accepted risk can be viewed in the PoliciesRisk acceptance section.

To accept the risk of a detected vulnerability:

  1. Click the vulnerability record ID in one of the following sections:
  2. In the sidebar that opens, go to the Risk acceptance tab.

    The Risk acceptance tab is available if you have rights to view accepted risks.

  3. Click the Add risk acceptance button.
  4. In the window that opens, specify the risk acceptance parameters:
    • Select the extent of risk acceptance:
      • for the selected artifact (image or CI/CD object)
      • for the repository containing the object with the detected vulnerability
      • for artifacts in which this vulnerability is currently detected
      • for all artifacts, including artifacts that the solution may find during subsequent scans.

      The risk is assumed regardless of the scope.

    • Specify a period from 1 to 999 days after which the risk acceptance for this vulnerability will be revoked. By default, the period is 30 days.
    • Specify the reason for risk acceptance.
  5. Click the Add button.

The accepted risk for the vulnerability is displayed on the Risk acceptance tab. It can also be viewed in the PoliciesAccepted risks section.

Page top