Skip to main content
Retrieve all issues. Required Permission:
  • cyera.read.issue
External DocumentationTo learn more, visit the Cyera documentation.

Basic Parameters

ParameterDescription
Created DateFilter issues created on or after the specified timestamp.
Issue UIDsA comma-separated list of issue UIDs to retrieve.
ProviderFilter issues by their provider.
Return All PagesAutomatically fetch all resources, page by page.
SeverityFilter issues by their severity.
StatusFilter issues by their status.
Updated DateFilter issues updated on or after the specified timestamp.

Advanced Parameters

ParameterDescription
Datastore UIDsA comma-separated list of datastore UIDs to filter the results by.
LimitThe maximum number of issues to retrieve in the result. Valid range is 1-100.
OffsetThe pagination offset indicating the starting point for the next set of results.
Policy UIDFilter issues by their policy UID.

Example Output

{
	"limit": 10,
	"offset": 0,
	"results": [
		{
			"account": {
				"inPlatformIdentifier": "012345678901",
				"name": "AWS-QA"
			},
			"classificationGroups": [
				"string"
			],
			"cloudProviderTags": [
				{
					"key": "Cloud Provider Tag Key",
					"value": "Cloud Provider Tag Value"
				}
			],
			"createdDate": "2022-11-05T12:51:08.000Z",
			"data": {
				"affectedRecords": 10,
				"dataClassesUids": [
					"d0d033c7-5cca-48d2-a270-f6848443f4a6"
				],
				"objectsAtRisk": 1,
				"recordsAtRisk": 10
			},
			"datastoreCloudProviderTags": [
				{
					"key": "Cloud Provider Tag Key",
					"value": "Cloud Provider Tag Value"
				}
			],
			"datastoreName": "users-bucket",
			"datastoreOwners": [
				{
					"datastoreOwnerUid": "123e4567-e89b-12d3-a456-426614174000",
					"email": "john.doe@example.com",
					"ownerType": "application-owner",
					"sources": [
						"string"
					]
				}
			],
			"datastoreUid": "379661c3-ad91-4691-ab58-8704ff5f6a9e",
			"datastoreUserTags": [
				{
					"key": "env",
					"uid": "id",
					"value": "prod"
				}
			],
			"engine": "Engine",
			"infrastructure": "Infrastructure",
			"itsmTickets": [
				{
					"uid": "753c0095-7a62-48ef-9e3c-1ddcc2261394",
					"vendorLink": "https://company.atlassian.net/browse/JIRA-12345",
					"vendorStatus": "In Progress",
					"vendorTicketId": "JIRA-12345"
				}
			],
			"name": "Sensitive Data in Public S3 Bucket",
			"owner": "Owner",
			"policyUid": "753c0095-7a62-48ef-9e3c-1ddcc2261394",
			"provider": "Account Platform",
			"regions": [
				"string"
			],
			"remediationAdvice": "Remediation Advice",
			"resolution": "Issue resolution reason, in case the issue is closed",
			"resolutionNote": "the issue was closed in version 2.13.0",
			"risk": {
				"description": "Public exposure of files in an S3 bucket is determined by the bucket's policy, the Block Public Access configurations on the bucket level, and the file's ACL (Access Control List). In this case, files containing sensitive data were identified as publicly exposed, meaning that the bucket's configuration allows public access or these specific files have ACL that allows public access. Misconfigured S3 buckets have been one of the top 5 causes of data leaks in the past years. These files can easily be stolen by cyber criminals.",
				"frameworks": [
					"Security Basics"
				],
				"policyUid": "bfa65d09-aa1e-611b-e7cc-5f342fc8ca0f",
				"useCases": [
					"PublicExposure"
				]
			},
			"riskStatus": "Issue risk status",
			"severity": "Severity",
			"status": "Issue status",
			"uid": "753c0095-7a62-48ef-9e3c-1ddcc2261394",
			"updatedDate": "2022-11-05T12:51:08.000Z"
		}
	],
	"total": 1
}

Workflow Library Example

List Issues with Cyera and Send Results Via Email
Workflow LibraryPreview this Workflow on desktop