Skip to content

Insights and Recommendations

The Insights and Recommendations report provides actionable security guidance by mapping your organization's threat detection findings to established cybersecurity frameworks. This report helps prioritize remediation efforts by showing which threat rules contribute most to your overall threat score and aligning them with industry-standard framework controls.

Overview

Insights and Recommendations bridge the gap between threat detection results and actionable security improvements. The report analyzes your organization's threat scores and correlates them with specific controls from major cybersecurity frameworks (NIST CSF v2.0, CIS v8, CRI Tier 4 v2), providing recommendations based on framework best practices.

Key Benefits:

  • Framework Alignment: Map detected threats to specific controls in NIST, CIS, and CRI frameworks
  • Prioritized Remediation: Identify which threat rules have the highest impact on your overall identity posture
  • Compliance Support: Generate evidence for framework compliance and maturity assessments
  • Actionable Recommendations: Get specific guidance for each threat rule based on framework controls
  • Impact Analysis: Understand how addressing specific threats will improve your overall security posture

Visual Integration: The Insights and Recommendations report is also visualized on the Insights and Recommendations page, accessible via click-through from the main Threat Score widget on the Identity Posture Dashboard.

Accessing the Insights and Recommendations Report

From Search Library

  1. Navigate to Search Library in the main navigation

  2. Locate the Owners & Accounts tile

  3. Select Insights and Recommendations

    The Insights and Recommendations overview table

From Identity Posture Dashboard

  1. Navigate to Identity Posture dashboard
  2. Click the Threat Score widget
  3. Select View Insights and Recommendations

Supported Cybersecurity Frameworks

The report supports three variants, each aligned with a different cybersecurity framework:

NIST CSF v2.0 (Default)

NIST Cybersecurity Framework version 2.0 - Comprehensive framework organized around six core functions: Identify, Protect, Detect, Respond, Recover, and Govern.

Use Cases:

  • General cybersecurity program alignment
  • Federal compliance requirements (FISMA, FedRAMP)
  • Broad industry applicability

Framework Structure:

  • Function codes (e.g., PR.AA-01, PR.IR-01)
  • Identity and access management controls
  • Incident response guidance

CIS v8

CIS Controls version 8 - Prioritized set of 18 critical security controls developed by the Center for Internet Security.

Use Cases:

  • Implementation-focused security programs
  • Small to medium organization security baselines
  • Practical, action-oriented guidance

Framework Structure:

  • Numbered controls (e.g., Control 5: Account Management, Control 6: Access Control Management)
  • Sub-control specifications
  • Implementation groups (IG1, IG2, IG3)

CRI Tier 4 v2

Cyber Resilience Institute Tier 4 version 2 - Framework focused on cyber resilience and operational continuity.

Use Cases:

  • Resilience-focused organizations
  • Operational technology (OT) environments
  • Business continuity planning integration

Framework Structure:

  • Tiered maturity model
  • Resilience-specific controls
  • Recovery-oriented guidance

Report Columns

The Insights and Recommendations report includes the following columns:

ColumnDescriptionExample Values
Threat RuleThe threat detection rule that triggered findings"Accounts with Password 180+ Days", "Highly Privileged Group(s)"
RecommendationFramework-derived action to address the threat"Ensure identities and credentials are managed by the organization"
ImpactCalculated percentage impact on overall threat score15.2%, 8.7%, 3.1%
AccountsNumber of accounts matching this threat rule45, 128, 7
FrameworkThe cybersecurity framework providing the recommendationNIST CSF V2.0, CIS V8, CRI TIER4 V2
Framework ControlSpecific control reference from the frameworkPR.AA-01, Control 5.1, R-3.2

Understanding Impact

Impact Calculation: The Impact percentage represents how much this specific threat rule contributes to your organization's overall threat score. It is calculated based on:

  • The severity/score assigned to the threat rule
  • The number of accounts affected
  • The rule's weighting in the overall threat model

Impact Interpretation:

  • High Impact (>10%): Critical remediation priority - addressing this threat significantly improves posture
  • Medium Impact (5-10%): Important remediation target - meaningful impact on overall score
  • Low Impact (<5%): Lower priority - limited effect on overall threat score

Strategic Use: Sort by Impact (highest first) to identify the most effective remediation efforts. Addressing high-impact threats provides the greatest improvement in your overall identity security posture.

Filtering and Customization

Report Filters

The Insights and Recommendations report supports several filters to refine and target your analysis:

Cyber Security Framework

Filter to view recommendations from a specific framework:

  • NIST CSF V2.0 - Default, comprehensive cybersecurity framework
  • CIS V8 - Implementation-focused security controls
  • CRI TIER4 V2 - Resilience-focused framework

Use Case: Select the framework that aligns with your organization's compliance or maturity goals.

Framework Control

Filter to view only threats mapped to a specific framework control.

Use Case:

  • Prepare evidence for specific control audits
  • Focus remediation on specific framework sections
  • Analyze coverage for particular control areas

Example: Filter to "PR.AA-01" to see all threats related to identity and credential management.

Min Impact / Max Impact

Specify the minimum and/or maximum impact percentage to create a focused range.

Use Cases:

  • High Impact Focus: Set Min Impact to 10% to see only critical remediation targets
  • Quick Wins: Set Max Impact to 5% to identify lower-effort improvements
  • Medium Priority: Set Min Impact 5% and Max Impact 10% for medium-priority items

Example: Min Impact = 10% shows only threats contributing more than 10% to your overall threat score.

Min Accounts / Max Accounts

Specify the minimum and/or maximum number of affected accounts.

Use Cases:

  • Large-Scale Issues: Set Min Accounts to 50 to focus on widespread problems
  • Manageable Tasks: Set Max Accounts to 10 to identify small, easily addressed issues
  • Prioritization Strategy: Use Max Accounts for quick remediation wins (fewer affected accounts)

Example:

  • Set Min Accounts to 0 and Max Accounts to 5 for breached accounts (immediate attention even for one account)
  • Set Min Accounts to 100 to identify systemic issues affecting many users

Combining Filters

Filters can be combined for targeted analysis:

Example Combinations:

  • Quick Wins: Max Impact 5% + Max Accounts 10 = Small, low-effort remediation tasks
  • Critical Issues: Min Impact 10% + Min Accounts 50 = Widespread, high-impact threats
  • Framework Audit: Framework Control "PR.AA-05" + Min Impact 5% = Significant privilege-related issues

Common Workflows

Compliance Reporting

Generate framework-aligned compliance evidence:

  1. Open Insights and Recommendations report
  2. Select the relevant Cyber Security Framework (e.g., NIST CSF V2.0)
  3. Filter by specific Framework Control if targeting particular controls
  4. Sort by Impact (descending) to show most significant findings
  5. Export CSV for compliance documentation
  6. Include in framework maturity assessments or gap analysis

Prioritized Remediation Campaign

Identify and address highest-impact threats:

  1. Open Insights and Recommendations report
  2. Sort by Impact (highest first)
  3. Set Min Impact to 10% to focus on critical items
  4. Review the top 5-10 threat rules
  5. For each rule:
    • Review Accounts count to understand scope
    • Read Recommendation for remediation guidance
    • Click through to threat rule details for affected accounts
  6. Create remediation tasks in order of impact

Small Task Remediation

Address quick wins with minimal effort:

  1. Open Insights and Recommendations report
  2. Set Max Accounts to 10 to identify small-scope issues
  3. Set Min Impact to 5% to ensure meaningful improvement
  4. Sort by Accounts (ascending)
  5. Address smallest tasks first for rapid progress
  6. Monitor threat score improvement over time

Framework Gap Analysis

Assess coverage for specific framework areas:

  1. Open Insights and Recommendations report
  2. Select relevant Cyber Security Framework
  3. Filter by Framework Control (e.g., PR.AA-05 for least privilege)
  4. Review all threats mapped to that control
  5. Compare with framework requirements
  6. Identify gaps where framework controls have no corresponding threats detected
  7. Consider creating custom threat rules for missing controls

Breach Response Prioritization

Focus on credential-related threats after a breach:

  1. Open Insights and Recommendations report
  2. Filter for breached account-related threat rules
  3. Set Min Accounts to 0 (every breached account matters)
  4. Review Impact to understand overall exposure
  5. Address high-impact credential threats first
  6. Use Framework Control references for remediation best practices

Exporting and Sharing

CSV Export

Export the report for offline analysis, documentation, or integration:

  1. Apply desired filters to narrow results
  2. Click Export CSV button
  3. CSV includes all visible columns with current filters applied
  4. Compatible with Excel, Google Sheets, and analytics tools

Export Use Cases:

  • Compliance evidence packages
  • Executive reporting and presentations
  • Remediation project planning
  • Integration with ticketing systems
  • Trend analysis over time (export monthly snapshots)

Saving Custom Views

Save frequently-used filter combinations as saved searches:

  1. Apply filters to create your desired view
  2. Click Save Search (if available)
  3. Name the search descriptively (e.g., "High Impact NIST Controls")
  4. Access saved searches from Global Search > Saved Searches

Integration with Threat Detection

The Insights and Recommendations report depends on properly configured threat detection rules.

Threat Rule Configuration

Each threat rule includes framework alignment metadata:

  • Framework: Which cybersecurity framework (NIST, CIS, CRI)
  • Function/Control: Specific framework control reference
  • Recommendation: Framework-derived guidance
  • Category: Threat category (Privilege, Password & Security, Breach Data, etc.)

View Threat Rules: Navigate to Configure > Identify > Threat Detection to view and customize threat rules.

Custom Threat Rules

Create custom threat rules to extend framework coverage:

  1. Navigate to Configure > Identify > Threat Detection
  2. Click Create Threat Rule
  3. Configure detection logic
  4. Assign Framework alignment (NIST CSF V2.0, CIS V8, or CRI TIER4 V2)
  5. Specify Framework Control reference
  6. Provide Recommendation text
  7. Custom rules appear in Insights and Recommendations report

Benefits:

  • Align organization-specific threats with frameworks
  • Fill gaps in default framework coverage
  • Tailor recommendations to your environment

Threat Rule Impact

Threat rule configuration directly affects Insights and Recommendations:

  • Score: Higher scores increase Impact percentage
  • Affected Accounts: More matches increase Impact
  • ShowInImpact: Rules with this disabled don't appear in Insights
  • Framework Alignment: Determines which framework variant includes the rule

Best Practices

Effective Use of Insights

  1. Regular Review: Review Insights and Recommendations weekly or monthly to track remediation progress
  2. Framework Selection: Choose the framework that aligns with your compliance requirements
  3. Prioritize by Impact: Start with highest-impact threats for maximum improvement
  4. Combine Strategies: Mix high-impact and low-account-count tasks for balanced progress
  5. Track Trends: Export monthly snapshots to track improvement over time
  6. Align with Compliance: Use framework controls to guide audit preparation

Remediation Strategy

  1. Assess Scope: Review Impact and Accounts to understand effort required
  2. Read Recommendations: Use framework guidance to understand proper remediation
  3. Create Tasks: Generate remediation tickets linked to framework controls
  4. Monitor Progress: Track threat score changes as remediation progresses
  5. Document Evidence: Save exports as compliance evidence
  6. Iterate: Regularly reassess as new data is collected

Common Pitfalls

  • Ignoring Low-Account Threats: Even a single breached privileged account is critical
  • Impact-Only Focus: Consider both impact and feasibility (account count) for balanced progress
  • Framework Mismatch: Ensure your selected framework aligns with actual compliance requirements
  • Static Analysis: Threat scores change as data is collected - review regularly
  • Missing Context: Click through to threat rule details to understand root causes

Troubleshooting

IssueSolution
No data displayedVerify threat detection rules are enabled and data collection has run
Impact percentages seem incorrectCheck threat rule scores and affected account counts - recalculate if rules changed
Missing framework controlsSome threat rules may not have framework alignment - add custom rules if needed
Export includes too many rowsApply filters before exporting to narrow results
Framework filter has no effectEnsure threat rules are configured with framework metadata
Accounts count doesn't match threat rule queryRun the underlying threat rule query directly to verify affected accounts

Hydden Documentation and Training Hub