Axura

Remediation

Fix security findings with automated remediation, guided manual steps, and enterprise safeguards. Axura helps you remediate faster while maintaining safety.
8 min read
Updated: January 2026
Remediation
Automation
Security
Fix

Remediation Options

Axura provides multiple remediation approaches depending on your comfort level and organizational requirements:

Guided Manual Remediation

Step-by-step instructions with screenshots. You execute the fix in your own console.

One-Click Remediation

Pre-approved scripts that Axura executes on your behalf. Requires appropriate IAM permissions.

Auto-Remediation

Automatic fixes triggered when specific findings are detected. Fully configurable.

Jira Integration

Create remediation tickets in Jira for your engineering team to handle.

Enterprise Safeguards

Axura includes enterprise-grade safeguards to prevent accidental damage:

SafeguardDescriptionUse Case
Kill SwitchEmergency stop for all automated remediationsIncident response, unexpected behavior
Circuit BreakerAuto-stops if too many failures occurPrevent cascading failures
Change WindowsOnly allow remediation during defined hoursBusiness hours only, no weekends
Four-Eyes ApprovalRequire approval from second personHigh-risk changes in production
Rate LimitingLimit number of remediations per hourPrevent runaway automation
⚠️ Production Safety

All automated remediations are logged and reversible. We recommend starting with guided manual remediation and gradually enabling automation as you build confidence.

Remediation Plans

For each finding, Axura generates a remediation plan:

Remediation Plan Example
{
  "finding_id": "finding_abc123",
  "title": "S3 Bucket Public Access Enabled",
  "severity": "high",
  "plan": {
    "type": "one-click",
    "estimated_time": "30 seconds",
    "risk_level": "low",
    "rollback_available": true,
    "steps": [
      {
        "order": 1,
        "action": "put-public-access-block",
        "resource": "arn:aws:s3:::my-bucket",
        "description": "Enable Block Public Access"
      }
    ],
    "verification": {
      "method": "rescan",
      "timeout": "5 minutes"
    }
  },
  "approval_required": false,
  "change_window_check": true
}

Auto-Remediation Rules

Configure rules for automatic remediation of common issues:

Auto-Remediation Rule
rule:
  name: "Block Public S3 Buckets"
  trigger:
    finding_type: "S3_PUBLIC_ACCESS"
    severity: ["critical", "high"]
    
  conditions:
    - bucket_name_not_contains: "public"
    - bucket_name_not_contains: "static"
    
  action:
    type: "remediate"
    method: "put-public-access-block"
    
  safeguards:
    require_approval: false
    change_window: "business_hours"
    rate_limit: "10 per hour"
    
  notifications:
    slack: "#security-alerts"
    email: "security@company.com"

Approval Workflow

For high-risk remediations, enable approval workflows:

1. User requests remediation ↓ 2. System checks if approval required ↓ 3. If yes → Create approval request ↓ 4. Approver receives notification (Slack/Email) ↓ 5. Approver reviews and approves/rejects ↓ 6. If approved → Execute remediation ↓ 7. Log result and notify requester

Remediation Scripts

Axura provides ready-to-use scripts in multiple formats:

  • AWS CLI - Direct AWS CLI commands
  • Terraform - Infrastructure as Code changes
  • CloudFormation - AWS native templates
  • Pulumi - Code-based infrastructure
  • Console Steps - GUI instructions with screenshots

Rollback Capability

For supported remediation types, Axura can automatically generate rollback scripts:

Rollback Example
# Original state captured before remediation
# Rollback script generated automatically

# To rollback the S3 public access block:
aws s3api delete-public-access-block \
  --bucket my-bucket

# Note: Use with caution. This will restore public access.
💡 Audit Trail

Every remediation action is logged with the user who initiated it, approval chain, timestamp, and result. This audit trail is immutable and available for compliance audits.

Next Steps