Configuring assignment rules
- UpdatedJul 31, 2025
- 7 minutes to read
- Zurich
- Unified Security Exposure Management (USEM)
By configuring assignment rules, you can automate the process of routing findings to the appropriate teams or individuals. By defining assignment criteria based on vulnerability attributes or affected assets, you can ensure timely and accurate ownership for remediation efforts.
Assignment rules help streamline vulnerability management by automatically assigning ownership to the correct team, reducing manual triage and accelerating response times.
In the Security Exposure Management Workspace, you can set up a single assignment rule that applies to all types of findings, including vulnerable items (VITs), application vulnerabilities (AVITs), container vulnerabilities (CVITs), and configuration test results (CTRs). This rule can then be applied to all the findings or a specific combination of findings.
Configuration of assignment rules includes the following steps.
Create or edit assignment rules
Create rules to assign findings automatically based on specific filter conditions. These rules apply to items as they’re imported or manually created.
Before you begin
Role required: See Access control lists (ACLs) for administration rules
About this task
The base system includes one default vulnerability assignment rule, Assign to CI support group, which assigns findings to the same assignment group as the CI support group. You can modify this rule using filter conditions or create a rule. With assignment rules, you define the conditions for assignment and the order in which they’re executed. Once a finding matches a rule condition, the assignment process stops.
Procedure
Reapply assignment rules
Reapply assignment rules to rerun assignment logic on existing findings or groups after they’ve already been created.
Before you begin
Role required: See Access control lists (ACLs) for administration rules
About this task
- Assignment rules are updated or newly created.
- Findings were previously unassigned or incorrectly assigned.
- You must reassign ownership based on updated business logic or CI ownership changes.
Procedure
Delete assignment rules
Delete assignment rules after careful consideration of potential impacts on the assignment logic and operational workflows.
Before you begin
Role required: See Access control lists (ACLs) for administration rules
About this task
- It’s removed from the rule table.
- It doesn’t affect already-assigned records. Deletion helps prevent the rule from applying to new or updated records going forward.
- Rules are evaluated in order. If a rule is deleted, the system evaluates the next matching rule.
Procedure
- Navigate to .
- Select Administration in the navigation pane.
- Select Review on the Assignment rules tile.
- On the Rules page, select Assignment in the navigation.
- Select the rule that you want to delete.
- In the assignment rules form, select the ellipses next to the Update button.
- Select Delete.
Remove assignments from findings and remediation tasks
Clear the Assigned to and Assignment group fields on vulnerable item records in the Vulnerability Response, Application Vulnerability Response, and Container Vulnerability Response applications.
Before you begin
- sn_vul.remediation_owner or sn_vul.vulnerability_analyst for vulnerable items (VITs) and remediation tasks (VULs).
- sn_vul.app_sec_manager for Application Vulnerability Response vulnerable items (AVITs) and remediation tasks (AVULs).
- sn_vul_container.remediation_owner or sn_vul_container.vulnerability_analyst for container vulnerable items (CVITs) and remediation tasks (CVULs).
About this task
- Remediation tasks (VULs, AVULs, and CVULs). If a remediation task is updated with this feature, the Assigned to and Assignment group fields on all of its associated VITs that have the same assignment group are also cleared.
- Vulnerable items (VITs).
- Application vulnerable items (AVITs).
- Container vulnerable items (CVITs).
Procedure
Result
The request is approved by using a default, one-level approval workflow. For more information, see Approve or reject an unassign request.
- If your request is approved, the state change approval record and the requested approval record transition to the Approved state. You and your groups are removed from the Assigned to and
Assignment group fields. Unassigned is displayed in the Assignment type field, and the remediation task and VITs are displayed in the list of the
Unassigned module for each product.
Notifications that records are unassigned are sent automatically to vulnerability managers or analysts in the Unassign notification group. To configure the approval flag, notifications, and default assignment group, see Remove assignments from findings and remediation tasks.
- If your request is rejected, the state of the change approval record and requested approval record transition to the Rejected state.
What to do next
Navigate to the Unassigned modules for the Vulnerability Response and Application Vulnerability Response Container Vulnerability Response applications, monitor any unassigned records for items that might fall under your scope, and reassign them to yourself.
Related Content
- Assigning findings to remediation teams using assignment rules
Assignment rules automatically assign findings, such as vulnerable items, application vulnerabilities, container vulnerabilities, and configuration test results, to the appropriate groups for remediation. This streamlined triage ensures that tasks are directed to the appropriate teams, and enhances consistency and visibility across security and compliance programs.