Access Entry
2. In the governance mode of any architecture diagram, go to the Cloud Risk Assessment application, and click any node bound to resources on the architecture diagram to open the risk information of the node.
3. The instances bound to the node will be displayed in the At Risk, Claimed, Ignored, and No Risk sections based on whether they have assessment risks, whether they have been added to governance, and whether an ignorance operation has been performed on them.
4. Click a risky instance to display the risk items and corresponding details for the instance.
5. Assign one or multiple instances. The risk handler for the instances can be recorded and the instances will be moved to the Claimed section.
Note:
If you have previously set risk items to Added to Governance or Held in an earlier version of Cloud Risk Assessment, the corresponding resource instances will be in the Claimed section.
Operation instructions:
Assign: identifies the owner responsible for handling the risk items, facilitating subsequent tracking of processing status and responsibility assignment.
Ignore: The risk assessment shows no impact or is inapplicable for other reasons, marking the corresponding risk as no longer requiring action.
Initiate node assessment: assesses the resources bound to the current node to check for the latest risk changes. This operation is applicable during the governance process or during assessment and risk status refresh after governance is complete.
6. Click Risk Search in the menu to open the risk search feature and search for and locate the nodes where the instances reside based on the risk items in the architecture diagram.