Get Remediation Status
POST/uve/api/v1/remediation/vuln-remediation-status
Get the remediation action status of assets. You can get the remediation status at two levels:
- Asset level - Get the remediation status of an asset by asset ID
- Group level - Get the remediation status of all assets of a specific asset type. To get group level status, specify only the asset type and not the asset ID.
Note: You need 'vulnerabilityRemediation' feature with 'View' permission to access this endpoint. Verify if your permission group includes this feature using the Get Permission Group by ID endpoint. You can also check this in the Prisma Cloud console by ensuring that Alerts > Remediate Vulnerabilities is enabled.
Request
- application/json
Body
required
CVE ID of the vulnerability.
Prisma ID allocated to the customer.
Possible values: [iac
, package
, deployedImage
, serverlessFunction
, host
, registryImage
, vmImage
]
Asset type
List of asset UAI IDs
Responses
- 200
OK
- application/json
- Schema
- Example (from schema)
- assetLevel
- groupLevel
Schema
- Array [
- Array [
- ]
- ]
values object[]
prisma ID of the customer
Unified asset ID of the asset
Possible values: [iac
, package
, deployedImage
, serverlessFunction
, host
, registryImage
, vmImage
]
Asset type of the asset
Possible values: [code
, build
, deploy
, run
]
Life cycle of the asset
CVE ID affecting the asset
Possible values: [COMPUTE
, BRIDGECREW
]
If the asset if Bridgecrew/Compute (placeholder, usually empty/null)
remediationAction object[]
Remediation actions available for the asset type
Possible values: [createTask
, createPr
, suppress
]
The remediation action
Possible values: [AVAILABLE
, IN_PROGRESS
, SUBMITTED
, DONE
, UNAVAILABLE
, SUPPRESSED
]
If the asset is AVAILABLE/ not so because of a certain reason
The JIRA link/PR link of the remediated asset if applicable
Reason for the current 'status' if applicable
The timestamp as of which the status was identified
{
"values": [
{
"prismaId": "string",
"unifiedAssetId": "string",
"assetType": "iac",
"assetLifecycle": "code",
"cveId": "string",
"source": "COMPUTE",
"remediationAction": [
{
"action": "createTask",
"status": "AVAILABLE",
"actionResult": "string",
"message": "string"
}
],
"lastUpdatedTimestamp": 0
}
]
}
{
"values": [
{
"prismaId": "1115545679050296320",
"unifiedAssetId": "0230eb1308fcf8dad743549e4092f4af",
"assetType": "host",
"assetLifecycle": "code",
"cveId": "CVE-2022-32207",
"source": "COMPUTE",
"remediationAction": [
{
"action": "createTask",
"status": "UNAVAILABLE",
"actionResult": "null",
"message": "Invalid Assets"
}
],
"lastUpdatedTimestamp": 1701782645308
}
]
}
{
"values": [
{
"prismaId": "1115545679050296320",
"unifiedAssetId": "code",
"assetType": "host",
"assetLifecycle": "code",
"cveId": "CVE-2022-32207",
"source": "COMPUTE",
"remediationAction": [
{
"action": "createTask",
"status": "AVAILABLE",
"actionResult": "null",
"message": "null"
}
],
"lastUpdatedTimestamp": 1701782708619
}
]
}