Identify all configuration items affected by a security incident
If you know which resource (server, desktop or other configuration item) is behind a security incident and want to identify related resources and business services that can be affected, you can use the Business Service Management (BSM) map.
Before you begin
Role required: admin or sn_si.admin
About this task
The BSM map displays the upstream and downstream dependencies for a selected root CI.
There are two methods you can use to view the BSM map for a CI:
- If you want to view CIs from the context of a task, view from the security incident form.
- If you do not want to view CIs from a task viewpoint, view from the navigation bar.