Create a Mitigation
The "Create a Mitigation" page allows users to set up and assign a mitigation plan based on specific scan results in CYRISMA. Follow the steps below to create and configure a mitigation plan effectively.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Step 1: Select Mitigation Plan Type
Begin by choosing the type of scan from which the mitigation plan will be derived. Available options include:
- Data
- Vulnerability
- Secure Baseline
Each type represents a different focus area for the mitigation effort, aligning the plan with scans conducted in these categories.
Step 2: Mitigation Plan Creation
1. Mitigation Plan Name
- Enter a unique and descriptive name for the mitigation plan to help identify its purpose.
2. Assign Plan To
- Select a user from the dropdown menu to assign responsibility for the mitigation plan.
- Note: Only users with "Mitigation Manager" permissions (enabled in user settings) will appear in this list.
3. Plan Start Date
- Select the start date for the mitigation plan using the calendar tool. This marks the beginning of the mitigation activities.
4. Plan End Date
- Set a due date for the plan’s completion. This is the target date by which all actions in the mitigation plan should be finalized.
Step 3: Assign Date to Mitigation Plan
1. Select Scan Date
- Choose the date on which the relevant scan was completed. This will narrow down the available scan options for the mitigation plan.
2. Select Scan Name
- Pick the specific scan from the dropdown menu. The list will populate based on the selected scan type and date, showing all available scans that match the chosen criteria.

Step 4: Select Target, Folder, or File
Once the scan name is selected, an additional section titled "Select Target, Folder, or File Below" will appear. Here, the user can choose specific targets, folders, or files that the mitigation plan will address.
Final Steps
At the bottom of the page, you have three options:
- Cancel: Exit the mitigation creation process without saving any changes.
- Reset: Clear all fields and selections to start the configuration from scratch.
- Submit: Finalize and save the mitigation plan. Once submitted, the assigned user will have the mitigation plan added to their responsibilities.

By following these steps, users can successfully create and assign targeted mitigation plans, ensuring timely and focused risk reduction efforts.