us-east-1
·
local (no data egress)
·
sha256:7d…a81c
Preview · mock data

Suppressions

6 active · 3 expiring ≤7d · 4 anomaly patterns detected

Waiver governance is drifting from policy
The waiver ledger shows 4 patterns that typically indicate alert-fatigue suppression rather than accepted-risk decisions. Review each below.

Detected patterns

auto-run nightly · thresholds configurable in /admin/rules
PatternCasesExampleSeverity
Same finding type, same approver, same day, ≥30 waivers1j.kim / #2 YOLO / 2026-03-28 / 96 waivers in 11 mincritical
BU with >80% waiver rate on a finding type1QA BU / #2 YOLO / 91% waivedcritical
Waiver reason uses ≤3 distinct strings across ≥20 waivers2j.kim uses "noisy" on 72 waivershigh
Waiver expiring ≤7d without renewal ticket33 critical findings expiring between Apr 18-22medium

Approver concentration

who's waiving how much — outliers flagged
ApproverRoleWaivers (90d)Worst single dayFleet shareSignal
j.kimSOC Lead14296 in one day68%Batch-approved 96 YOLO waivers on Fri 2026-03-28 within 11 min window
secops@corpSecOps team3412%Distributed approvals · no concentration pattern
ciso@corpCISO186%Executive-level approvals · documented reasons
Anomaly detection runs nightly. Rule thresholds (approver concentration %, BU waiver %, pattern duplication) are configurable in Detection Rules.