How the remediation workflow works
Suggestion
A remediation action is created from a drift finding, vulnerability, or recommendation. The action describes exactly what change will be made — for example, “enable S3 bucket server-side encryption on
my-bucket”.Review
The action appears in the Remediation queue. You can see the full details: what will change, which resource is affected, and the severity of the underlying finding.
Approval
If approval is required (the default for actions affecting resources), an admin approves the action. You can leave a comment for audit trail purposes.
Execution
InfraAudit calls the cloud provider API to apply the fix. The status changes to
executing while the call is in progress, then to completed on success.Remediation queue
In the sidebar, click Remediation. The queue shows:| Column | Description |
|---|---|
| Action | What the remediation will do |
| Resource | The affected resource |
| Source | The drift, vulnerability, or recommendation that created it |
| Severity | Severity of the underlying finding |
| Status | Current status in the lifecycle |
| Created | Timestamp |
suggested, pending_approval, approved, executing, completed, failed, rolled_back.
Approving an action
Click the remediation action to review the full details, then click Approve.Executing a remediation
After approval, click Execute in the UI. If Auto-execute after approval is enabled in your settings, this step is skipped and execution begins automatically.Rolling back
Within the rollback window (30 minutes by default), click Rollback on a completed action. InfraAudit reverses the change using the configuration snapshot captured before execution.Approval settings
Configure remediation behavior under Settings → Remediation:| Setting | Description |
|---|---|
| Require approval | Enable or disable approval gates. Enabled by default. |
| Auto-execute after approval | Skip the manual execute step. The fix runs immediately after approval. |
| Rollback window | Duration of the rollback window: 5 to 120 minutes. Default is 30 minutes. |
Supported remediation types
| Resource | Actions |
|---|---|
| S3 | Enable server-side encryption, block public access, enable versioning |
| EC2 | Remove overly permissive security group rules, enable termination protection |
| IAM | Rotate access keys, remove unused access keys |
| RDS | Enable Multi-AZ, enable automated backups, enable encryption |
| Kubernetes | Set resource limits and requests, enable pod security policies |
CLI reference
Next steps
- Recommendations — the suggestions that generate remediation actions
- Drift detection — drift findings that can trigger remediations
- Alerts — configure notifications when remediations succeed or fail