Permissions: Remediation & Mitigation Ingrid Refer to the following permissions for using various remediation & mitigation tools. Access Personally Identifiable Information (PII) Company Notes Customize the Asset Risk Matrix Finding Comments Issue Tracking Issue Tracking: Rescan Work From Home See permissions key and other actions. Access Personally Identifiable Information (PII) Export and download Exposed Credentials data for your organization. View the Identity Intelligence Preview card. ✅ Admin ✅ Group Admin ➖ Internal Business User ➖ Operations ❌ Portfolio Manager ❌ User ➖ View Only Company Notes Edit or delete company notes. ✅ Admin ❌ Group Admin ➖ Internal Business User ➖ Operations ✅ Portfolio Manager – Permitted if owned. ✅ User – Permitted if owned. ➖ View Only Customize the Asset Risk Matrix Customize the Asset Risk Matrix. ✅ Admin ❌ Group Admin ➖ Internal Business User ➖ Operations ❌ Portfolio Manager ❌ User ➖ View Only Finding Comments Edit or delete finding comments. ✅ Admin ❌ Group Admin ➖ Internal Business User ➖ Operations ✅ Portfolio Manager – Permitted if owned. ✅ User – Permitted if owned. ➖ View Only Issue Tracking View, assign users to remediate a finding (Issue Tracking) ✅ Admin ✅ Group Admin – View and assign findings in their group (group access). ➖ Internal Business User ➖ Operations ✅ Portfolio Manager – View and assign findings in their group (group access). ✅ User – View and assign findings in their group (group access). ➖ View Only Issue Tracking: Rescan Choose whether to automatically trigger a rescan when a finding's remediation status is set to Resolved. ✅ Admin ❌ Group Admin ➖ Internal Business User ➖ Operations ❌ Portfolio Manager ❌ User ➖ View Only Work From Home Use Work From Home. ✅ Admin ❌ Group Admin ➖ Internal Business User ➖ Operations ❌ Portfolio Manager ❌ User ➖ View Only March 25, 2025: Identity Intelligence Preview. February 28, 2025: Automatically trigger a rescan when a finding's remediation status is set to Resolved. January 3, 2025: Customize the Asset Risk Matrix. Related articles Exposed Credentials Data Findings: Issue Tracking Marsh McLennan Study: Correlation Between Bitsight Analytics and Cybersecurity Incidents Remediation Verification: DKIM Records Attack Surface: Cloud Infrastructure Sync Feedback 0 comments Please sign in to leave a comment.