tencent cloud

Tencent Cloud Smart Advisor

Release Notes
Product Introduction
Overview
Features
Product Strengths
Scenarios
Customer Cases
Purchase Guide
Getting Started
Using TSA to Execute a Chaos Experiment on CFG
Operation Guide
Operation Guide to TSA-Cloud Architecture
Operation Guide to TSA-Cloud Risk Assessment
Operation Guide to TSA-Chaotic Fault Generator
Operation Guide to TSA-Digital Assets
Permission Management
API Documentation
History
Introduction
API Category
Making API Requests
Other APIs
Task APIs
Cloud Architecture Console APIs
Data Types
Error Codes
FAQs
FAQs: TSA
FAQs: TSA-Cloud Risk Assessment
FAQs: TSA-Cloud Architecture
FAQs: TSA-Chaotic Fault Generator
Related Protocol
Tencent Cloud Smart Advisor Service Level Agreement
PRIVACY POLICY MODULE CHAOTIC FAULT GENERATOR
DATA PRIVACY AND SECURITY AGREEMENT MODULE CHAOTIC FAULT GENERATOR
Contact Us

Governance Architecture Risks

PDF
Focus Mode
Font Size
Last updated: 2026-03-31 22:13:52

Access Entry

2. In the governance mode of any architecture diagram, go to the Cloud Risk Assessment application, and click any node bound to resources on the architecture diagram to open the risk information of the node.
3. The instances bound to the node will be displayed in the At Risk, Claimed, Ignored, and No Risk sections based on whether they have assessment risks, whether they have been added to governance, and whether an ignorance operation has been performed on them.
4. Click a risky instance to display the risk items and corresponding details for the instance.
5. Assign one or multiple instances. The risk handler for the instances can be recorded and the instances will be moved to the Claimed section.
Note:
If you have previously set risk items to Added to Governance or Held in an earlier version of Cloud Risk Assessment, the corresponding resource instances will be in the Claimed section.
Operation instructions:
Assign: identifies the owner responsible for handling the risk items, facilitating subsequent tracking of processing status and responsibility assignment.
Ignore: The risk assessment shows no impact or is inapplicable for other reasons, marking the corresponding risk as no longer requiring action.
Initiate node assessment: assesses the resources bound to the current node to check for the latest risk changes. This operation is applicable during the governance process or during assessment and risk status refresh after governance is complete.
6. Click Risk Search in the menu to open the risk search feature and search for and locate the nodes where the instances reside based on the risk items in the architecture diagram.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback