Overview
This article outlines the standard workflow for creating a mitigation graph in Hyver. You’ll learn how to sketch, build, and link findings to attack routes — giving you a structured view of how threats could reach your business assets.
You can use this same workflow to create a new graph or update an existing one over time.
Step-by-Step: Creating a Mitigation Graph
1. Plan the Graph First
Before opening the platform, start by sketching the structure of your graph:
Use a whiteboard or graphics tool to map out attack paths.
Begin on the left with known threat sources.
End on the right with your business assets.
In between, outline the key findings and positions where vulnerabilities are present.
This step helps clarify the attack logic before modeling it in Hyver.
2. Enable Graph Editing
In the mitigation graph view, toggle Edit Graph to On using the toolbar at the top:
This mode allows you to create or modify graph elements.
3. Add Threat Sources and Business Assets
Define threat sources and business assets in the graph.
If they were already created in the system (via the Threat Sources or Business Assets pages), you can pull them directly into the graph.
These elements serve as the start and end points of attack routes.
Note: You cannot create middle or aggregated positions unless at least one threat and one business asset exist in the graph.
4. Draw Edges and Link Findings
Draw edges (arrows) between positions to represent possible steps in an attack:
Each time you draw an edge, the Finding Wizard opens:
You can link an existing finding or create a new one.
These edges form the backbone of the attack routes that make up your mitigation graph.
5. Review and Plan Mitigation
Once the graph is in place, use the built-in tools to:
Highlight critical findings
Visualize most probable attack routes
Plan and prioritize mitigation using the data represented in your graph
This turns your graph into a living, actionable map of your risk landscape.
Wrap-up / Next Steps
Creating a mitigation graph is both strategic and technical — it combines structured planning with live vulnerability data. Once built, your graph becomes a central tool for managing and reducing cyber risk over time.
Ready to start building? Make sure you have the right permissions and a good understanding of your threat landscape.


