Skip to main content

Mitigation Graph Creation Workflow

Follow this step-by-step workflow to create or update a mitigation graph in Hyver.

Updated over 5 months ago

Overview

This article outlines the standard workflow for creating a mitigation graph in Hyver. You’ll learn how to sketch, build, and link findings to attack routes — giving you a structured view of how threats could reach your business assets.

You can use this same workflow to create a new graph or update an existing one over time.


Step-by-Step: Creating a Mitigation Graph

1. Plan the Graph First

Before opening the platform, start by sketching the structure of your graph:

  • Use a whiteboard or graphics tool to map out attack paths.

  • Begin on the left with known threat sources.

  • End on the right with your business assets.

  • In between, outline the key findings and positions where vulnerabilities are present.

This step helps clarify the attack logic before modeling it in Hyver.


2. Enable Graph Editing

  • In the mitigation graph view, toggle Edit Graph to On using the toolbar at the top:

  • This mode allows you to create or modify graph elements.


3. Add Threat Sources and Business Assets

  • Define threat sources and business assets in the graph.

  • If they were already created in the system (via the Threat Sources or Business Assets pages), you can pull them directly into the graph.

  • These elements serve as the start and end points of attack routes.

Note: You cannot create middle or aggregated positions unless at least one threat and one business asset exist in the graph.


4. Draw Edges and Link Findings

  • Draw edges (arrows) between positions to represent possible steps in an attack:

  • Each time you draw an edge, the Finding Wizard opens:

    • You can link an existing finding or create a new one.

  • These edges form the backbone of the attack routes that make up your mitigation graph.


5. Review and Plan Mitigation

Once the graph is in place, use the built-in tools to:

  • Highlight critical findings

  • Visualize most probable attack routes

  • Plan and prioritize mitigation using the data represented in your graph

This turns your graph into a living, actionable map of your risk landscape.


Wrap-up / Next Steps

Creating a mitigation graph is both strategic and technical — it combines structured planning with live vulnerability data. Once built, your graph becomes a central tool for managing and reducing cyber risk over time.

Ready to start building? Make sure you have the right permissions and a good understanding of your threat landscape.

Did this answer your question?