[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["| Enterprise [service tier](/security-command-center/docs/service-tiers)\n\nRequired roles\n\n\nTo get the permissions that\nyou need to work with issues,\n\nask your administrator to grant you the\nfollowing IAM roles on the organization:\n\n- To view issues, one of the following roles:\n - [Security Center Findings Viewer](/iam/docs/roles-permissions/securitycenter#securitycenter.findingsViewer) (`roles/securitycenter.findingsViewer`)\n - [Security Center Issues Viewer](/iam/docs/roles-permissions/securitycenter#securitycenter.issuesViewer) (`roles/securitycenter.issuesViewer`)\n- To view, mute, and unmute issues: [Security Center Issues Editor](/iam/docs/roles-permissions/securitycenter#securitycenter.issuesEditor) (`roles/securitycenter.issuesEditor`)\n\n\nFor more information about granting roles, see [Manage access to projects, folders, and organizations](/iam/docs/granting-changing-revoking-access).\n\n\nThese predefined roles contain\n\nthe permissions required to work with issues. To see the exact permissions that are\nrequired, expand the **Required permissions** section:\n\n\nRequired permissions\n\nThe following permissions are required to work with issues:\n\n- To view issues:\n - ` securitycenter.issues.get`\n - ` securitycenter.issues.list`\n - ` securitycenter.issues.group`\n - ` securitycenter.issues.listFilterValues`\n- To mute and unmute issues: ` securitycenter.issues.mute`\n\n\nYou might also be able to get\nthese permissions\nwith [custom roles](/iam/docs/creating-custom-roles) or\nother [predefined roles](/iam/docs/roles-overview#predefined).\n\nView issues\n\nYou can find issues in two places:\n\n- The **Risk \\\u003e Overview** page. This page shows an at-a-glance view of the top risks found in your cloud environments, including issues.\n- The **Risk \\\u003e Issues** page, which lists all issues found in your cloud environments. It also provides greater detail on each of the issues, including how to remediate them.\n\nTo view all issues, go to **Risk \\\u003e Issues**.\n\nTo view individual issues, expand a detection group, and then click one\nof the issues in the group. The issue's details\npanel opens, which contains the following elements:\n\n- A summary of the issue.\n- An interactive attack path or evidence diagram.\n- Findings related to the issue.\n- A **How to fix** tab, which provides remediation steps.\n- For toxic combinations and chokepoints, an **Exposed valued resources** tab, which lists the high-valued resources that are affected by the issue.\n- For security graph insights, an **Impacted Resources** tab, which lists the resources that contribute to the issue. This tab displays if more than six resources contribute to an issue.\n- A **JSON** tab, which provides the issue data in JSON format.\n\nTo step between issues in the queue, click the arrow icons next to the\n**Take Actions** button.\n\nRemediate issues\n\nTo remediate an issue, complete the following instructions:\n\n1. To view all issues, go to **Risk \\\u003e Issues**.\n2. Select your Google Cloud organization.\n3. By default, grouped issues are ranked by severity. Within the group, the issues are ranked by attack exposure score. To sort all issues by attack exposure score instead, disable **Group by detections**.\n4. Select an issue.\n5. Review the issue's description and evidence.\n6. If there are related findings, view their details.\n7. If multiple critical issues are found on a primary resource in a toxic combination or chokepoint, a message displays after the **Evidence** diagram. To optimize your remediation efforts, click **Filter issues for this primary resource** in this message to focus on resolving issues for that specific resource. Click the back arrow near **Add filter** when you want to remove the filter.\n8. Click **Explore full attack paths** in the **Evidence** diagram for an in-depth understanding of the issue, and how the attack paths expose high-value resources.\n9. Click **How to fix**, and follow the guidance to help mitigate the risk.\n\nMute issues\n\nIf the risk that's posed by an issue is acceptable to\nyour business or you can't remediate it, you can choose to mute it. This tags\nthe issue as muted, and records who muted the\nissue and when. You can only mute individual issues,\nnot entire detections.\n\nTo mute an issue, complete the following steps:\n\n1. Open an issue's details panel.\n2. Click **Take Actions**.\n3. Click **Mute**.\n4. Enter the reason why you are muting the issue, and then click **Mute**.\n\nAfter you've muted an issue, it can take a few minutes\nfor this to be reflected in the issues list. After this, the\nissue won't show in the list with the default filters\napplied.\n\nView muted issues\n\nTo view muted issues, click\n\n**Add filter** , and then add a **Show muted issues** filter with a value of\n**Yes** . Click **Apply** to apply the filter.\n\nUnmute issues\n\nTo unmute an issue, complete the following steps:\n\n1. [Filter the view by muted issues](#filter).\n2. Open the issue's details panel.\n3. Click **Take Actions**.\n4. Click **Unmute**.\n5. Enter the reason why you are unmuting the issue, and then click **Unmute**."]]