

# Mitigation actions
<a name="dd-mitigation-actions"></a>

You can use AWS IoT Device Defender to take actions to mitigate issues that were found in an Audit finding or Detect alarm. 

**Note**  
Mitigation actions won't be performed on suppressed audit findings. For more information about audit finding suppressions, see [Audit finding suppressions](audit-finding-suppressions.md).

## Audit mitigation actions
<a name="dd-audit-mitigation-actions"></a>

AWS IoT Device Defender provides predefined actions for the different audit checks. You configure those actions for your AWS account and then apply them to a set of findings. Those findings can be:
+ All findings from an audit. This option is available in both the AWS IoT console and by using the AWS CLI.
+ A list of individual findings. This option is only available by using the AWS CLI.
+ A filtered set of findings from an audit.

The following table lists the types of audit checks and the supported mitigation actions for each:


**Audit check to mitigation action mapping**  

| Audit check | Supported mitigation actions | 
| --- | --- | 
| REVOKED\$1CA\$1CERT\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1CA\$1CERTIFICATE | 
| INTERMEDIATE\$1CA\$1REVOKED\$1FOR\$1ACTIVE\$1DEVICE\$1CERTIFICATES\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1DEVICE\$1CERTIFICATE, ADD\$1THINGS\$1TO\$1THING\$1GROUP | 
| DEVICE\$1CERTIFICATE\$1SHARED\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1DEVICE\$1CERTIFICATE, ADD\$1THINGS\$1TO\$1THING\$1GROUP | 
| UNAUTHENTICATED\$1COGNITO\$1ROLE\$1OVERLY\$1PERMISSIVE\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS | 
| AUTHENTICATED\$1COGNITO\$1ROLE\$1OVERLY\$1PERMISSIVE\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS | 
| IOT\$1POLICY\$1OVERLY\$1PERMISSIVE\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, REPLACE\$1DEFAULT\$1POLICY\$1VERSION | 
| IOT\$1POLICY\$1POTENTIAL\$1MISCONFIGURATION\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, REPLACE\$1DEFAULT\$1POLICY\$1VERSION | 
| CA\$1CERTIFICATE\$1EXPIRING\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1CA\$1CERTIFICATE | 
| CONFLICTING\$1CLIENT\$1IDS\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS | 
| DEVICE\$1CERTIFICATE\$1EXPIRING\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1DEVICE\$1CERTIFICATE, ADD\$1THINGS\$1TO\$1THING\$1GROUP | 
| REVOKED\$1DEVICE\$1CERTIFICATE\$1STILL\$1ACTIVE\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1DEVICE\$1CERTIFICATE, ADD\$1THINGS\$1TO\$1THING\$1GROUP | 
| LOGGING\$1DISABLED\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, ENABLE\$1IOT\$1LOGGING | 
| DEVICE\$1CERTIFICATE\$1KEY\$1QUALITY\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1DEVICE\$1CERTIFICATE, ADD\$1THINGS\$1TO\$1THING\$1GROUP | 
| CA\$1CERTIFICATE\$1KEY\$1QUALITY\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS, UPDATE\$1CA\$1CERTIFICATE | 
| IOT\$1ROLE\$1ALIAS\$1OVERLY\$1PERMISSIVE\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS | 
| IOT\$1ROLE\$1ALIAS\$1ALLOWS\$1ACCESS\$1TO\$1UNUSED\$1SERVICES\$1CHECK | PUBLISH\$1FINDING\$1TO\$1SNS | 

All audit checks support publishing the audit findings to Amazon SNS so you can take custom actions in response to the notification. Each type of audit check can support additional mitigation actions:

**REVOKED\$1CA\$1CERT\$1CHECK**  
+ Change the state of the certificate to mark it as inactive in AWS IoT.

**DEVICE\$1CERTIFICATE\$1SHARED\$1CHECK**  
+ Change the state of the device certificate to mark it as inactive in AWS IoT.
+ Add the devices that use that certificate to a thing group.

**UNAUTHENTICATED\$1COGNITO\$1ROLE\$1OVERLY\$1PERMISSIVE\$1CHECK**  
+ No additional supported actions.

**AUTHENTICATED\$1COGNITO\$1ROLE\$1OVERLY\$1PERMISSIVE\$1CHECK**  
+ No additional supported actions.

**IOT\$1POLICY\$1OVERLY\$1PERMISSIVE\$1CHECK**  
+ Add a blank AWS IoT policy version to restrict permissions.

**IOT\$1POLICY\$1POTENTIAL\$1MISCONFIGURATION\$1CHECK**  
+ Identify potential misconfigurations in AWS IoT policies.

**CA\$1CERT\$1APPROACHING\$1EXPIRATION\$1CHECK**  
+ Change the state of the certificate to mark it as inactive in AWS IoT.

**CONFLICTING\$1CLIENT\$1IDS\$1CHECK**  
+ No additional supported actions.

**DEVICE\$1CERT\$1APPROACHING\$1EXPIRATION\$1CHECK**  
+ Change the state of the device certificate to mark it as inactive in AWS IoT.
+ Add the devices that use that certificate to a thing group.

**DEVICE\$1CERTIFICATE\$1KEY\$1QUALITY\$1CHECK**  
+ Change the state of the device certificate to mark it as inactive in AWS IoT.
+ Add the devices that use that certificate to a thing group.

**CA\$1CERTIFICATE\$1KEY\$1QUALITY\$1CHECK**  
+ Change the state of the certificate to mark it as inactive in AWS IoT.

**REVOKED\$1DEVICE\$1CERT\$1CHECK**  
+ Change the state of the device certificate to mark it as inactive in AWS IoT.
+ Add the devices that use that certificate to a thing group.

**LOGGING\$1DISABLED\$1CHECK**  
+ Enable logging.

AWS IoT Device Defender supports the following types of mitigation actions on Audit findings:


****  

|  Action type  | Notes | 
| --- | --- | 
| ADD\$1THINGS\$1TO\$1THING\$1GROUP | You specify the group to which you want to add the devices. You also specify whether membership in one or more dynamic groups should be overridden if that would exceed the maximum number of groups to which the thing can belong. | 
| ENABLE\$1IOT\$1LOGGING | You specify the logging level and the role with permissions for logging. You cannot specify a logging level of DISABLED. | 
| PUBLISH\$1FINDING\$1TO\$1SNS | You specify the topic to which the finding should be published. | 
| REPLACE\$1DEFAULT\$1POLICY\$1VERSION | You specify the template name. Replaces the policy version with a default or blank policy. Only a value of BLANK\$1POLICY is currently supported. | 
| UPDATE\$1CA\$1CERTIFICATE | You specify the new state for the CA certificate. Only a value of DEACTIVATE is currently supported. | 
| UPDATE\$1DEVICE\$1CERTIFICATE | You specify the new state for the device certificate. Only a value of DEACTIVATE is currently supported. | 

By configuring standard actions when issues are found during an audit, you can respond to those issues consistently. Using these defined mitigation actions also helps you resolve the issues more quickly and with less chance of human error.

**Important**  
Applying mitigation actions that change certificates, add things to a new thing group, or replace the policy can have an impact on your devices and applications. For example, devices might be unable to connect. Consider the implications of the mitigation actions before you apply them. You might need to take other actions to correct the problems before your devices and applications can function normally. For example, you might need to provide updated device certificates. Mitigation actions can help you quickly limit your risk, but you must still take corrective actions to address the underlying issues.

Some actions, such as reactivating a device certificate, can only be performed manually. AWS IoT Device Defender does not provide a mechanism to automatically roll back mitigation actions that have been applied. 

## Detect mitigation actions
<a name="dd-detect-mitigation-actions"></a>

AWS IoT Device Defender supports the following types of mitigation actions on Detect alarms:


|  Action type  | Notes | 
| --- | --- | 
| ADD\$1THINGS\$1TO\$1THING\$1GROUP | You specify the group to which you want to add the devices. You also specify whether membership in one or more dynamic groups should be overridden if that would exceed the maximum number of groups to which the thing can belong. | 

## How to define and manage mitigation actions
<a name="dd-manage-mitigation-actions"></a>

You can use the AWS IoT console or the AWS CLI to define and manage mitigation actions for your AWS account.

### Create mitigation actions
<a name="dd-create-mitigation-action"></a>

Each mitigation action that you define is a combination of a predefined action type and parameters specific to your account.

**To use the AWS IoT console to create mitigation actions**

 

1. Open the [Mitigation actions page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/mitigationActionConfigsHub).

1. On the **Mitigation actions** page, choose **Create**.

1. On the **Create a new mitigation action** page, in **Action name**, enter a unique name for your mitigation action.

1. In **Action type**, specify the type of action that you want to define.

1. In **Permissions**, choose the IAM role under whose permissions the action is applied.

1. Each action type requests a different set of parameters. Enter the parameters for the action. For example, if you choose the **Add things to thing group** action type, choose the destination group and select or clear **Override dynamic groups**.

1. Choose **Create** to save your mitigation action to your AWS account.

**To use the AWS CLI to create mitigation actions**
+ Use the [CreateMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_CreateMitigationAction.html) command to create your mitigation action. The unique name that you give the action is used when you apply that action to audit findings. Choose a meaningful name.

**To use the AWS IoT console to view and modify mitigation actions**

1. Open the [Mitigation actions page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/mitigationActionConfigsHub).

   The **Mitigation actions** page displays a list of all of the mitigation actions that are defined for your AWS account.

1. Choose the action name link for the mitigation action that you want to change.

1. Choose **Edit** and make your changes to the mitigation action. You cannot change the name because the name of the mitigation action is used to identify it.

1. Choose **Update** to save the changes to the mitigation action to your AWS account.

**To use the AWS CLI to list a mitigation action**
+ Use the [ListMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_ListMitigationAction.html) command to list your mitigation actions. If you want to change or delete a mitigation action, make a note of the name.

**To use the AWS CLI to update a mitigation action**
+ Use the [UpdateMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_UpdateMitigationAction.html) command to change your mitigation action.

**To use the AWS IoT console to delete a mitigation action**

1. Open the [Mitigation actions page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/mitigationActionConfigsHub).

   The **Mitigation actions** page displays all of the mitigation actions that are defined for your AWS account.

1. Choose the the mitigation action that you want to delete, and then choose **Delete**.

1. In the **Are you sure you want to delete** window, choose **Delete**.

**To use the AWS CLI to delete mitigation actions**
+ Use the [UpdateMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_UpdateMitigationAction.html) command to change your mitigation action.

**To use the AWS IoT console to view mitigation action details**

1. Open the [Mitigation actions page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/mitigationActionConfigsHub).

   The **Mitigation actions** page displays all of the mitigation actions that are defined for your AWS account.

1. Choose the action name link for the mitigation action that you want to view.

**To use the AWS CLI to view mitigation action details**
+ Use the [DescribeMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_DescribeMitigationAction.html) command to view details for your mitigation action.

## Apply mitigation actions
<a name="dd-audit-apply-mitigation-actions"></a>

After you have defined a set of mitigation actions, you can apply those actions to the findings from an audit. When you apply actions, you start an audit mitigation actions task. This task might take some time to complete, depending on the set of findings and the actions that you apply to them. For example, if you have a large pool of devices whose certificates have expired, it might take some time to deactivate all of those certificates or to move those devices to a quarantine group. Other actions, such as enabling logging, can be completed quickly.

You can view the list of action executions and cancel an execution that has not yet been completed. Actions already performed as part of the canceled action execution are not rolled back. If you are applying multiple actions to a set of findings and one of those actions failed, the subsequent actions are skipped for that finding (but are still applied to other findings). The task status for the finding is FAILED. The `taskStatus` is set to failed if one or more of the actions failed when applied to the findings. Actions are applied in the order in which they are specified.

Each action execution applies a set of actions to a target. That target can be a list of findings or it can be all findings from an audit.

The following diagram shows how you can define an audit mitigation task that takes all findings from one audit and applies a set of actions to those findings. A single execution applies one action to one finding. The audit mitigation actions task outputs an execution summary.

![\[Conceptual image shows an audit mitigation actions task.\]](http://docs.aws.amazon.com/iot-device-defender/latest/devguide/images/conceptual-mitigation-actions-audit.png)


The following diagram shows how you can define an audit mitigation task that takes a list of individual findings from one or more audits and applies a set of actions to those findings. A single execution applies one action to one finding. The audit mitigation actions task outputs an execution summary.

![\[Conceptual image shows an audit mitigation actions task.\]](http://docs.aws.amazon.com/iot-device-defender/latest/devguide/images/conceptual-mitigation-actions-findings.png)


You can use the AWS IoT console or the AWS CLI to apply mitigation actions.

**To use the AWS IoT console to apply mitigation actions by starting an action execution**

1. Open the [Audit results page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/auditResultsHub).

1. Choose the name for the audit to which you want to apply actions.

1. Choose **Start mitigation actions**. This button is not available if all of your checks are compliant.

1. In **Start a new mitigation action**, the task name defaults to the audit ID, but you can change it to something more meaningful.

1. For each type of check that had one or more noncompliant findings in the audit, you can choose one or more actions to apply. Only actions that are valid for the check type are displayed.
**Note**  
If you have not configured actions for your AWS account, the list of actions is empty. You can choose the ** Create mitigation action** link to create one or more mitigation actions.

1. When you have specified all of the actions that you want to apply, choose **Start task**.

**To use the AWS CLI to apply mitigation actions by starting an audit mitigation actions execution**

1. If you want to apply actions to all findings for the audit, use the [ListAuditTasks](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditTasks.html) command to find the task ID.

1. If you want to apply actions to selected findings only, use the [ListAuditFindings](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditFindings.html) command to get the finding IDs.

1. Use the [ListMitigationActions](https://docs.aws.amazon.com/iot/latest/apireference/API_ListMitigationActions.html) command and make note of the names of the mitigation actions that you want to apply.

1. Use the [StartAuditMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_StartAuditMitigationActionsTask.html) command to apply actions to the target. Make note of the task ID. You can use the ID to check the state of the action execution, review the details, or cancel it.

   

**To use the AWS IoT console to view your action executions**

1. Open the [Action tasks page in the AWS IoT console](https://console.aws.amazon.com//iot/home#/dd/auditTasksHub).

   A list of action tasks shows when each was started and the current status.

1. Choose the **Name** link to see details for the task. The details include all of the actions that are applied by the task, their target, and their status.  
![\[Details for the audit mitigation action task.\]](http://docs.aws.amazon.com/iot-device-defender/latest/devguide/images/audit-action-execution-task-details.png)

   You can use the **Show executions for** filters to focus on types of actions or action states.

1. To see details for the task, in **Executions**, choose **Show**.  
![\[Execution details for the audit mitigation action task.\]](http://docs.aws.amazon.com/iot-device-defender/latest/devguide/images/audit-action-execution-task-executions.png)

**To use the AWS CLI to list your started tasks**

1. Use [ListAuditMitigationActionsTasks](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditMitigationActionsTasks.html) to view your audit mitigation actions tasks. You can provide filters to narrow the results. If you want to view details of the task, make note of the task ID.

1. Use [ListAuditMitigationActionsExecutions](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditMitigationActionsExecutions.html) to view execution details for a particular audit mitigation actions task.

1. Use [DescribeAuditMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_DescribeAuditMitigationActionsTask.html) to view details about the task, such as the parameters specified when it was started.

**To use the AWS CLI to cancel a running audit mitigation actions task**

1. Use the [ListAuditMitigationActionsTasks](https://docs.aws.amazon.com/iot/latest/apireference/API_ListDetectMitigationActionsExecutions.html) command to find the task ID for the task whose execution you want to cancel. You can provide filters to narrow the results.

1. Use the [ListDetectMitigationActionsExecutions](https://docs.aws.amazon.com/iot/latest/apireference/API_CancelAuditMitigationActionsTask.html) command, using the task ID, to cancel your audit mitigation actions task. You cannot cancel tasks that have been completed. When you cancel a task, remaining actions are not applied, but mitigation actions that were already applied are not rolled back.

## Permissions
<a name="dd-audit-mitigation-permissions"></a>

For each mitigation action that you define, you must provide the role used to apply that action.




**Permissions for mitigation actions**  

| Action type | Permissions policy template | 
| --- | --- | 
|  UPDATE\$1DEVICE\$1CERTIFICATE  |    JSON   

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement":[
        {
            "Effect":"Allow",
            "Action":[
                "iot:UpdateCertificate"
            ],
            "Resource":[
                "*"
            ]
        }
    ]
}
```      | 
| UPDATE\$1CA\$1CERTIFICATE |    JSON   

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement":[
        {
            "Effect":"Allow",
            "Action":[
                "iot:UpdateCACertificate"
            ],
            "Resource":[
                "*"
            ]
        }
    ]
}
```      | 
| ADD\$1THINGS\$1TO\$1THING\$1GROUP |    JSON   

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement":[
        {
            "Effect":"Allow",
            "Action":[
                "iot:ListPrincipalThings",
                "iot:AddThingToThingGroup"
            ],
            "Resource":[
                "*"
            ]
        }
    ]
}
```      | 
| REPLACE\$1DEFAULT\$1POLICY\$1VERSION |    JSON   

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement":[
        {
            "Effect":"Allow",
            "Action":[
                "iot:CreatePolicyVersion"
            ],
            "Resource":[
                "*"
            ]
        }
    ]
}
```      | 
| ENABLE\$1IOT\$1LOGGING |    JSON   

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "iot:SetV2LoggingOptions"
      ],
      "Resource": "*"
    },
    {
      "Effect": "Allow",
      "Action": [
        "iam:PassRole"
      ],
      "Resource": "arn:aws:iam::123456789012:role/IoTLoggingRole"
    }
  ]
}
```      | 
| PUBLISH\$1FINDING\$1TO\$1SNS |    JSON   

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement":[
        {
            "Effect":"Allow",
            "Action":[
                "sns:Publish"
            ],
            "Resource":[
                "arn:aws:sns:us-east-1:123456789012:example-topic"
            ]
        }
    ]
}
```      | 

For all mitigation action types, use the following trust policy template:

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Sid": "",
      "Effect": "Allow",
      "Principal": {
        "Service": "iot.amazonaws.com"
      },
      "Action": "sts:AssumeRole",
      "Condition": {
        "ArnLike": {
          "aws:SourceArn": "arn:aws:iot:*:123456789012::*"
        },
        "StringEquals": {
          "aws:SourceAccount": "123456789012:"
        }
      }
    }
  ]
}
```

------

# Mitigation action commands
<a name="mitigation-action-commands"></a>

You can use these mitigation action commands to define a set of actions for your AWS account that you can later apply to one or more sets of audit findings. There are three command categories: 
+ Those used to define and manage actions.
+ Those used to start and manage the application of those actions to Audit findings.
+ Those used to start and manage the application of those actions to Detect alarms.


**Mitigation action commands**  

|  Define and manage actions  |  Start and manage Audit execution  |  Start and manage Detect execution  | 
| --- | --- | --- | 
|  [CreateMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_CreateMitigationAction.html)  |  [CancelAuditMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_CancelAuditMitigationActionsTask.html)  |  [CancelDetectMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_CancelDetectMitigationActionsTask4e.html)   | 
|  [DeleteMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_DeleteMitigationAction.html)  |  [DescribeAuditMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_DescribeAuditMitigationActionsTask.html)  |  [DescribeDetectMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_DescribeDetectMitigationActionsTask.html)  | 
|  [DescribeMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_DescribeMitigationAction.html)  |  [ListAuditMitigationActionsTasks](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditMitigationActionsTasks.html)  |  [ListDetectMitigationActionsTasks](https://docs.aws.amazon.com/iot/latest/apireference/API_ListDetectMitigationActionsTasks.html)  | 
|  [ListMitigationActions](https://docs.aws.amazon.com/iot/latest/apireference/API_ListMitigationActions.html)  |  [StartAuditMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_StartAuditMitigationActionsTask.html)  | [StartDetectMitigationActionsTask](https://docs.aws.amazon.com/iot/latest/apireference/API_StartDetectMitigationActionsTask.html) | 
|  [UpdateMitigationAction](https://docs.aws.amazon.com/iot/latest/apireference/API_UpdateMitigationAction.html)  |  [ListAuditMitigationActionsExecutions](https://docs.aws.amazon.com/iot/latest/apireference/API_ListAuditMitigationActionsExecutions.html)  |  [ListDetectMitigationActionsExecutions](https://docs.aws.amazon.com/iot/latest/apireference/API_ListDetectMitigationActionsExecutions.html)  | 