Using the Risk Analysis Tool

SecureChange Requester This topic is intended for SecureChange handlers who are responsible for processing change requests.

Overview

When handling a task containing an Access Request field, you can obtain automatic risk information. The Risk Analysis tool considers the request’s security and compliance based on its source, destination, and service or application, compared to the defined USP matrices.

When a request whose targets are Palo Alto devices, includes application identities (both predefined and custom applications), the risk analysis considers application group members in the request as no risk when the USP contains either the parent application group or the member itself. There is no automatic translation between an application and its services. If in the USP an application is specified and not its service, and in the request the application's service is specified and not the application, or vice versa, this will be considered a risk.

Risk analysis is only available if it was enabled for the step in workflow configuration. The following types of analysis are available:

  • External risk analysis: Risk Analysis is calculated based on a third party tool. For details, see Configuring 3rd Party Risk Analysis

  • Unified security policy: SecureChange matches the access request traffic with SecureTrack zones, where the Internet zone is defined by all IP addresses except for those that are included in other SecureTrack zones. Any traffic that violates the SecureTrack Unified Security Policy (USP) is shown as a violation.

    Rule properties that violate the USP are not included in the risk analysis, and do not appear as violations.

When there is a risk, you can:

  • Move to the next step with the risk

  • Reject the ticket

  • Disregard the risk

What Can I Do Here?

Obtaining Automatic Risk Information Using Risk Analysis

  1. In the Access Request field, click Risk Analysis:

    run risk analysis

    If there is no Risk Analysis button, check if risk analysis was enabled in this step of the workflow configuration.

    The RSK button is displayed in one of these colors:

    • Green: Request does not violate any configured policies (No risk mark).

    • Red: Request violates at least one policy ().

    • Yellow: The system cannot run Risk Analysis (No risk mark).

    view risk results

  2. If the RSK button is red, click mark risk to view the risk details.

    Risk analysis results

  3. To return to the request, click on the request name in the bread crumbs.

    run risk analysis

  4. When there is a risk, you can:

    • Move to the next step with the risk:

      • Click Done. The RSK button remains red, and the workflow moves to the next step.

    • Reject the ticket:
      1. From the Manage Tasks options, click Reject Ticket:

        Reject ticket

      2. Enter a reason and click Reject. The ticket is closed.

    • Disregard the risk:

      1. Click mark risk to view the risk details.

      2. Enter an explanation, in the textbox at the bottom of the window and click Disregard.

        Reject ticket

      3. Click on the request name in the bread crumbs to return to the Request window. The RSK button changed to green with an asterisk (No risk mark) to indicate that the risk that was manually disregarded. A disregarded risk email is sent, as configured in the mail notifications.