Skip to main content

Mitigation Graph

Explore how to build, interpret, and use the Mitigation Graph in Hyver — from attack routes to risk quantification and remediation planning.

25 articles
Mitigation Graph OverviewLearn how Hyver's mitigation graph maps attack routes and helps prioritize remediation efforts.
Mitigation Graph ComponentsUnderstand each component of the mitigation graph and how it represents threats, assets, and vulnerabilities.
Attack Routes in the Mitigation GraphUnderstand how attack routes illustrate threats to your business assets and help prioritize remediation.
Findings and Positions in the Mitigation GraphLearn how to view and explore findings and positions directly from the mitigation graph.
Searching in the Mitigation GraphFind specific findings, positions, or assets quickly using the search feature in the mitigation graph.
Working with Positions in the Mitigation GraphLearn how to move, edit, and manage positions in the mitigation graph to organize and analyze attack routes.
Mitigation Graph ToolsExplore the key tools available in the mitigation graph toolbar to search, edit, and plan effectively.
Quantification of Cyber RiskUnderstand how Hyver calculates cyber risk and prioritizes mitigation based on real-world attack routes and business impact.
Graph AuditTrack changes to the mitigation graph using the History tab, visible to users with edit permissions.
Tips for Building Attack RoutesFollow these best practices to build clear, accurate, and high-impact attack routes in the mitigation graph.