K-Shield Quick Tasks
Use this page for fast execution. For the complete scanning, monitoring, VM, and compliance workflow, use K-Shield (Security).
Task 1: Run First Node Security Scan (5-10 Minutes)
When to Use:
Use this when a node has not yet been baselined.
Purpose:
Establish the first node-level security baseline and populate findings.
Steps:
Open
K-Shield -> Dashboard.Select
Node level.Open a reachable managed node.
Click
Start Security Scanand choose the approved security profile.Wait for completion and refresh if needed.
Expected Outcome:
Scan status is
COMPLETED.Compliance score and CAT findings are visible on the managed-node page.
If this fails:
Verify the node is reachable in the left panel.
Confirm your role has scan permission.
Retry once after refreshing the page.
If still failing, collect node name/time and escalate via
support@karios.com.
Task 2: Triage Findings in Correct Order (5-10 Minutes)
When to Use:
Use this immediately after a completed scan.
Purpose:
Prioritize remediation in the correct severity order.
Steps:
Review CAT I findings first.
Review CAT II findings next.
Review compliance trend and total open findings.
Open one critical/high finding and capture remediation details.
Expected Outcome:
Priority queue is documented.
One remediation action owner and timeline is assigned.
If this fails:
Confirm scan data is refreshed and current.
Re-open the managed-node
OvervieworCompliancetab and verify severity counts.If findings are missing, run one more scan and re-check.
Task 3: Verify Remediation (3-8 Minutes)
When to Use:
Use this after applying a remediation change.
Purpose:
Validate that the applied fix reduced risk.
Steps:
Apply approved remediation change.
Re-run the scan on the same managed node or VM.
Compare findings and score with prior run.
Expected Outcome:
Target finding count decreases or severity is reduced.
Evidence (timestamps, IDs, results) is recorded.
If this fails:
Confirm remediation was applied to the same target that was scanned.
Review recommendation prerequisites and re-apply if needed.
Re-scan and compare by scan ID/time.
Escalate unresolved critical findings through your internal chain.
Task 4: Security Escalation Path (2-3 Minutes)
When to Use:
Use this for critical findings, repeated failures, or blocked remediation.
Purpose:
Route incidents to the correct internal and platform escalation paths.
Steps:
Use your customer internal chain for governance approvals.
Use
support@karios.comfor Karios platform/vendor escalation.Include target ID, scan timestamp, severity summary, and impact scope.
Expected Outcome:
Escalation owner is clear.
Required incident details are shared in the first message.
If this fails:
Re-send with complete details: target, scan ID, timestamp, severity, impact.
Confirm the internal on-call/escalation owner is notified.
Track follow-up in your incident record.
Escalate immediately when:
CAT I findings affect production-critical assets
Compliance drops below your approved policy threshold
Scan repeatedly fails after one controlled retry