Skip to main content

Import Template Fields Reference

Understand how to complete each field in the Hyver import template.

Updated over 5 months ago

Overview

This article explains how to fill out the fields in Hyver’s CSV import template when manually uploading findings.
Some fields are required, others are optional — but each plays a role in ensuring imported findings are correctly categorized and actionable within Hyver.


Details

Field Name

Options / Format

Mandatory

Notes

Finding Name

Text

Yes

Provide a clear, descriptive title. Example: Weak password used in ABC environment.

Severity

Critical, High, Medium, Low, Informative

Yes

Choose one of the listed options. This influences prioritization and risk scoring.

Summary

Text

Yes

Short explanation of the issue. Keep it concise and meaningful.

NIST v1.1 ID

Subcategory IDs (e.g., PR.DS-3; PR.IP-1)

Yes*

You only need to enter either v1.1 or v2.0. Hyver will auto-fill the other version. Separate multiple subcategories with semicolons (;).

NIST v2.0 ID

Subcategory IDs (e.g., GV.OC-04; GV.RM-01)

Yes*

Same as above. Required only if v1.1 is not provided.

Security Domain

Short label (e.g., identity, network, application)

Yes

Use the short form — Hyver will map it to the full name. Examples: identity = Identity Management and Remote Access application = Application-Level Security

Status

Open, To do, In progress, On hold, Fixed, Acceptable risk, Reopen, Not relevant, Draft, Approved, Not approved, Awaiting approval

No

Defaults to Open. Findings are shared with “Anyone with permission” by default.

Probability

Numeric (1–100)

No

Required only if you want the finding to appear in the Mitigation Graph.

Description

Text

No

Provide a detailed description of the finding.

Business Impact

Text

No

Describe how exploitation of this finding could affect your organization.

Mitigation Recommendations

Text (separate multiple actions with ;)

No

Example: Update password policy; Disable unused accounts

MITRE ATT&CK

Tactic_Technique format (e.g., Execution_PowerShell)

No

Combine tactic and technique in one field. Separate multiple entries with semicolons. Refer to MITRE documentation for valid values.

Remediation Effort (Estimated)

Neglected, Low, Medium, High, Very High, Unknown

No

Indicates estimated effort to remediate, based on internal experience or external data.

Remediation Cost (Estimated)

Very High, High, Medium, Low, Neglected, Unknown

No

Cost indicators reflect financial investment needed to remediate.

Engagement

Text

No

Defaults to: Company Name – Imported Data. You can also specify a different active engagement. Must be activated before import.

Type

Vulnerability, Potential

No

Defaults to Vulnerability. Use Potential for unverified findings.

CVSS Vector

Text

No

Optional CVSS classification string.

Kill Chain

Reconnaissance, Weaponization, Delivery, Installation, Command & Control, Actions on Objectives

No

Indicates the stage of the Cyber Kill Chain where this finding applies.

Verification Complexity

Complex, Simple

No

Use Complex for fixes that require multiple steps or assessments.

Tags

Text; separated by ;

No

Add custom tags for sorting and filtering. Example: authentication;external;priority1


Wrap-up / Next Steps

Use this table as a reference when filling out the import CSV. The more complete and accurate your entries are, the easier it is to manage findings inside Hyver post-import.

Did this answer your question?