Investigate risks
Triage authorization risks, prioritize issues, and take action
Overview
This guide explains how to investigate authorization risks in Veza. The Risks page supports a triage workflow that helps you systematically identify, prioritize, and address security issues across your environment.
Use this workflow to:
Identify which risk categories need the most attention
Prioritize response efforts based on severity and impact
Drill down to specific entities that require action
Take action through rules, alerts, access reviews, or exceptions
Before you start
Before investigating risks:
Ensure your integrations are configured and extracting data
Review the Risk Profile categories to understand how risks are classified
Familiarize yourself with your organization's risk tolerance and response policies
Triage risks by category
Start on the Overview tab to understand your overall risk landscape. The Risk Profile cards show where risks are concentrated: MFA Health, Privileged Access, Dormant Access, Blast Radius, Orphaned Access, Access Risk, and Identity Hygiene. An Uncategorized card shows risks without an assigned profile.
Go to Access Intelligence > Risks.
Review the Risk Profiles cards to see the count of open risks in each category.
Review the Risks by Level chart to understand severity distribution.
Check Top Affected Integrations to identify which systems have the most risks.
Click a Risk Profile card to navigate to the All Risks tab filtered by that category.
Filter and prioritize risks
Use the All Risks tab filters to narrow your focus to the most important risks.
On the All Risks tab, apply filters based on your priorities:
Status: Select "Open" to see only risks requiring attention
Risk Level: Start with "Critical" and "High" severity risks
Risk Profiles: Focus on a specific category if you clicked through from Overview
Integration Types: Filter to specific systems if needed
Sort the table by Affected Entities to see which queries flag the most entities.
Review query names to understand what each risk detects.
Drill into affected entities
Click the Affected Entities count for a query to see the specific entities flagged by that risk.
Click the entity count in the Affected Entities column.
Review each entity's attributes and understand why it matches the query conditions.
Determine the appropriate action:
Fix: Address the underlying issue in the source system
Exception: Mark as acceptable if the access is intentional
Escalate: Create an access review for stakeholder evaluation
Take action
The Risks page provides different actions depending on whether you're working at the query level or entity level.
Query-level actions
From the All Risks table, click the Actions menu (โฎ) for a risk query to access:
Open in Query Builder
View and modify the query definition
Create Rule
Create an automation rule with Veza Actions
Create Alert
Set up notifications when query results change
Manage Exceptions
View and manage all exceptions for this query
Manage Risk Details
Update risk level and Risk Profile assignments
Launch Access Review
Create an access review for flagged entities
Entity-level actions
From the Affected Entities tab in query details, click the Actions menu (โฎ) for an entity to access:
Open in Graph
View the entity and its relationships in Graph view
Open in Query Builder
Open the query with this entity in context
Mark as Exception
Mark the entity as an exception for this risk
Add Risk Assignee
Assign an owner for addressing this risk entity
Add Note
Add contextual notes about this entity
Mark as exception
If the access is intentional and acceptable, mark the entity as an exception:
Navigate to the Affected Entities tab for the risk query.
Click the Actions menu (โฎ) for the entity.
Click Mark as Exception.
Add a note explaining why the exception is appropriate.
Click Confirm.
For detailed instructions, see Manage risk exceptions.
Create a rule or alert
Set up automated responses for risk conditions:
From the All Risks table, click Actions for the risk query.
Click Create Rule or Create Alert.
Configure the trigger conditions and actions.
Save the rule.
Launch an access review
Escalate to stakeholders for evaluation:
From the All Risks table, click Actions for the risk query.
Click Launch Access Review.
Configure the review scope and reviewers.
Start the review.
For more information, see Create a review. You can also configure On-demand reviews to automatically create reviews when risk conditions are detected.
Track progress
Monitor your risk response efforts over time:
Return to the Overview tab.
Review the Open & Resolved Risks chart to see Open vs. Resolved trends.
Check if risk counts are decreasing in your target Risk Profile categories.
A risk becomes Resolved when all flagged entities have been addressedโeither by fixing the underlying issue or by marking them as exceptions.
See also
Last updated
Was this helpful?
