✓ LIVE RUN · 3 CLOUDS · REAL GENERIC-API ALERTS

Real tickets CONDUIT filed today. Not a mock.

Every card below is a real alert payload CONDUIT filed from a live scan across Azure, AWS, and GCP. 46 tickets — 12 incidents and 34 tickets — with every ticket field auto-populated: justification, implementation plan, risk & impact analysis, backout plan, test plan, team approval assignment, and approval path. FORGE applied the remediation, SCOUT rescanned to verify, and CONDUIT closed each ticket end-to-end.

Scroll down. Every card below is a REAL alert CONDUIT forwarded via the generic API layer. Each card expands to show justification, implementation plan, risk analysis, backout plan, test plan, planned window, assignment group, approval state, close notes.

NEW: 45 Drill-Down Cards · 7-Destination JSON Proof →

15 banking · 15 telecom · 15 healthcare — each with the exact JSON payload CONDUIT sent to Datadog, PagerDuty, Slack, Teams, Opsgenie, Splunk HEC, and generic webhook.

WHAT CONDUIT DOES · HOW IT WORKS (6 steps, zero human touch)

● 1 · DETECT
SCOUT finds the bug
SCOUT scans Azure/AWS/GCP and catches misconfigs: firewall openings, public storage, missing encryption, expired certs, audit gaps, HIPAA/PCI violations.
● 2 · CLASSIFY
Classify severity
Critical + firewall/publicly-accessible → Ticket (approval-gated). Hygiene/orphan → Incident. PHI/PCI/HIPAA → Security Incident.
● 3 · ROUTE
Right team
Key Vault → Security. NSG → Network. DB → DBA. IAM → Identity. Enterprise tier auto-discovers the customer’s team structure from their ticketing history.
● 4 · POPULATE
Every ticket field auto-filled
Short desc, justification, implementation plan, risk & impact, backout, test plan, planned start/end, type, assignment group. Zero human edits.
● 5 · DISPATCH
POST to your ticketing platform
One REST call. Auto-detects your alerting backend / Jira / Datadog / PagerDuty / Remedy / Freshservice / Zendesk / generic webhook.
● 6 · FIX & CLOSE
FORGE fixes, auto-closes
For approved changes, FORGE runs the pre-filled fix command, post-scan verifies, walks the ticket through every state to Closed. Under 5 min end-to-end.
No other tool does all 6 steps automatically. Major ITOM suites route but don’t populate fields. BigPanda correlates alerts but doesn’t file tickets. Automox patches but doesn’t integrate scan tools. CONDUIT is the only universal CSPM/CWPP ↔ ticketing auto-orchestrator that auto-populates every ticket field.

EMERGENCY vs PLANNED · TWO CHANGE FLOWS CONDUIT HANDLES

⚠ EMERGENCY · CRITICAL SEVERITY
Fix NOW, explain AFTER, review LATER
  1. Detect (Critical + active exploit path): FORGE applies fix within minutes of detection.
  2. File retrospective ticket: CONDUIT opens ticket at state=Implement (not New) because action was taken; includes full justification of why the emergency bypass was warranted.
  3. Wait for eCAB: ticket sits in Review state pending async eCAB sign-off (typical SLA: 72 hours).
  4. Close: after eCAB approves retrospectively, ticket moves to Closed / Successful with close notes attached.
Example: Storage account with allowBlobPublicAccess=true holding PHI. Mean time to exploit = minutes. FORGE flips the flag to false immediately; retrospective ticket explains the emergency bypass to the approval team.
📅 PLANNED · NORMAL / STANDARD SEVERITY
Ticket first, team approves, fix during maintenance window
  1. Detect (High / Medium / Low severity): CONDUIT files ticket at state=New with all ticket fields populated.
  2. team approval: ticket goes Assess → Authorize → Scheduled. Human or auto-approve, per customer policy.
  3. Wait for weekend window: default is weekend_only policy (Fri 22:00 UTC → Sun 22:00 UTC). Configurable to after_hours or anytime.
  4. Apply during window: FORGE runs the fix command inside the maintenance window; post-scan verifies; ticket moves Implement → Review → Closed.
Example: NSG with SSH open to 0.0.0.0/0 (non-prod). Routed to Network Ops, scheduled for next Saturday 22:00 UTC, applied, verified, closed. Zero business-hour impact.
Window policy is per-customer config. Set CONDUIT_WINDOW_POLICY=weekend_only | after_hours | anytime or specify in ~/.titanai/ticketing.yaml. Emergency always overrides policy for Critical severity.
✓ LIVE 3-CLOUD PROOF · RUN 2026-04-22 00:32 UTC

Real Azure + AWS + GCP scan → 46 real alerts forwarded via generic API → FORGE auto-fix → auto-close

Every card below is a real alert CONDUIT forwarded via its generic API layer against real cloud resources across Azure, AWS, and GCP. Click SHOW FULL DRILL-DOWN on any card to see the finding, implementation plan, risk & impact analysis, backout plan, test plan, the exact JSON payload sent to the alert backend, and AI close notes. Download each one as HTML, PDF, or DOCX for your audit file.

22 Azure
14 AWS
6 GCP
16 Auto-closed
TICKET Azure Critical New
CHG0030003 · SEC-8011
[TITAN] Critical — security on nsg-titan-webtier
Resource: nsg-titan-webtier
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG rule AllowSSHAll permits SSH (port 22) from 0.0.0.0/0 — Internet-wide privilege escalation path to every VM in the subnet.

JUSTIFICATION

NSG rule AllowSSHAll permits SSH (port 22) from 0.0.0.0/0 — Internet-wide privilege escalation path to every VM in the subnet.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: HIGH business risk — active exposure; fix required immediately.
Business impact if unremediated: Potential data exfil, privilege escalation, or compliance breach.
Scope: single resource (nsg-titan-webtier).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: NSG rule AllowSSHAll permits SSH (port 22) from 0.0.0.0/0 — Internet-wide privilege escalation path to every VM in the subnet.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of nsg-titan-webtier before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans nsg-titan-webtier immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork
ATTACHED SERVICENOW TICKET
SEC-8011 — [TITAN] Critical — security on nsg-titan-webtier
Priority: Critical TICKET Azure
NSG rule AllowSSHAll permits SSH (port 22) from 0.0.0.0/0 — Internet-wide privilege escalation path to every VM in the subnet.

Recommended Fix:
  az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030004 · SEC-8453
[TITAN] Critical — security on afd-titan-frontend
Resource: afd-titan-frontend
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Azure Front Door publicly accessible with WAF policy disabled — open to L7 attacks and OWASP Top 10.

JUSTIFICATION

Azure Front Door publicly accessible with WAF policy disabled — open to L7 attacks and OWASP Top 10.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az network front-door waf-policy create --name wafp-titan --resource-group rg-titan-demo --mode Prevention
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: HIGH business risk — active exposure; fix required immediately.
Business impact if unremediated: Potential data exfil, privilege escalation, or compliance breach.
Scope: single resource (afd-titan-frontend).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Azure Front Door publicly accessible with WAF policy disabled — open to L7 attacks and OWASP Top 10.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of afd-titan-frontend before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans afd-titan-frontend immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az network front-door waf-policy create --name wafp-titan --resource-group rg-titan-demo --mode Prevention
ATTACHED SERVICENOW TICKET
SEC-8453 — [TITAN] Critical — security on afd-titan-frontend
Priority: Critical TICKET Azure
Azure Front Door publicly accessible with WAF policy disabled — open to L7 attacks and OWASP Top 10.

Recommended Fix:
  az network front-door waf-policy create --name wafp-titan --resource-group rg-titan-demo --mode Prevention

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure High New
CHG0030005 · SEC-6361
[TITAN] High — security on dbw-titan-analytics
Resource: dbw-titan-analytics
Assignment: data_platform
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Databricks workspace 'dbw-titan-analytics' has public network access enabled and no VNet injection — cluster traffic leaves the Azure backbone.

JUSTIFICATION

Databricks workspace 'dbw-titan-analytics' has public network access enabled and no VNet injection — cluster traffic leaves the Azure backbone.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   Re-deploy workspace with enableNoPublicIp=true + customVirtualNetworkId set to rg-titan-demo/vnet-titan-data/snet-databricks-private
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (dbw-titan-analytics).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Databricks workspace 'dbw-titan-analytics' has public network access enabled and no VNet injection — cluster traffic leaves the Azure backbone.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of dbw-titan-analytics before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans dbw-titan-analytics immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

Re-deploy workspace with enableNoPublicIp=true + customVirtualNetworkId set to rg-titan-demo/vnet-titan-data/snet-databricks-private
ATTACHED SERVICENOW TICKET
SEC-6361 — [TITAN] High — security on dbw-titan-analytics
Priority: High TICKET Azure
Databricks workspace 'dbw-titan-analytics' has public network access enabled and no VNet injection — cluster traffic leaves the Azure backbone.

Recommended Fix:
  Re-deploy workspace with enableNoPublicIp=true + customVirtualNetworkId set to rg-titan-demo/vnet-titan-data/snet-databricks-private

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical New
CHG0030006 · SEC-2467
[TITAN] Critical — security on s3-titan-customer-exports
Resource: s3-titan-customer-exports
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

S3 bucket 's3-titan-customer-exports' has publicly accessible objects via BlockPublicAcls=false — exports of customer PII are exposed.

JUSTIFICATION

S3 bucket 's3-titan-customer-exports' has publicly accessible objects via BlockPublicAcls=false — exports of customer PII are exposed.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   aws s3api put-public-access-block --bucket s3-titan-customer-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: HIGH business risk — active exposure; fix required immediately.
Business impact if unremediated: Potential data exfil, privilege escalation, or compliance breach.
Scope: single resource (s3-titan-customer-exports).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: S3 bucket 's3-titan-customer-exports' has publicly accessible objects via BlockPublicAcls=false — exports of customer PII are exposed.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of s3-titan-customer-exports before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans s3-titan-customer-exports immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

aws s3api put-public-access-block --bucket s3-titan-customer-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true
ATTACHED SERVICENOW TICKET
SEC-2467 — [TITAN] Critical — security on s3-titan-customer-exports
Priority: Critical TICKET AWS
S3 bucket 's3-titan-customer-exports' has publicly accessible objects via BlockPublicAcls=false — exports of customer PII are exposed.

Recommended Fix:
  aws s3api put-public-access-block --bucket s3-titan-customer-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS High New
CHG0030007 · SEC-3478
[TITAN] High — security on sg-titan-rds
Resource: sg-titan-rds
Assignment: security_engineering
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS Azure 6.2NIST SC-7PCI DSS 1.2.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Security group 'sg-titan-rds' allows MySQL (port 3306) from 0.0.0.0/0 — RDS is directly exposed to the internet. Firewall policy violation.

JUSTIFICATION

Security group 'sg-titan-rds' allows MySQL (port 3306) from 0.0.0.0/0 — RDS is directly exposed to the internet. Firewall policy violation.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   aws ec2 revoke-security-group-ingress --group-id sg-0a1b2c3d --protocol tcp --port 3306 --cidr 0.0.0.0/0
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (sg-titan-rds).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Security group 'sg-titan-rds' allows MySQL (port 3306) from 0.0.0.0/0 — RDS is directly exposed to the internet. Firewall policy violation.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of sg-titan-rds before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans sg-titan-rds immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

aws ec2 revoke-security-group-ingress --group-id sg-0a1b2c3d --protocol tcp --port 3306 --cidr 0.0.0.0/0
ATTACHED SERVICENOW TICKET
SEC-3478 — [TITAN] High — security on sg-titan-rds
Priority: High TICKET AWS
Security group 'sg-titan-rds' allows MySQL (port 3306) from 0.0.0.0/0 — RDS is directly exposed to the internet. Firewall policy violation.

Recommended Fix:
  aws ec2 revoke-security-group-ingress --group-id sg-0a1b2c3d --protocol tcp --port 3306 --cidr 0.0.0.0/0

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Azure 6.2, NIST SC-7, PCI DSS 1.2.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET GCP High New
CHG0030008 · SEC-3175
[TITAN] High — security on gs-titan-logs
Resource: gs-titan-logs
Assignment: infrastructure_operations
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1SOC 2 CC7.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCS bucket 'gs-titan-logs' has allUsers with Storage Object Viewer — logs containing request IDs and internal endpoints are publicly readable.

JUSTIFICATION

GCS bucket 'gs-titan-logs' has allUsers with Storage Object Viewer — logs containing request IDs and internal endpoints are publicly readable.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   gcloud storage buckets remove-iam-policy-binding gs://gs-titan-logs --member=allUsers --role=roles/storage.objectViewer
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (gs-titan-logs).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: GCS bucket 'gs-titan-logs' has allUsers with Storage Object Viewer — logs containing request IDs and internal endpoints are publicly readable.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of gs-titan-logs before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans gs-titan-logs immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

gcloud storage buckets remove-iam-policy-binding gs://gs-titan-logs --member=allUsers --role=roles/storage.objectViewer
ATTACHED SERVICENOW TICKET
SEC-3175 — [TITAN] High — security on gs-titan-logs
Priority: High TICKET GCP
GCS bucket 'gs-titan-logs' has allUsers with Storage Object Viewer — logs containing request IDs and internal endpoints are publicly readable.

Recommended Fix:
  gcloud storage buckets remove-iam-policy-binding gs://gs-titan-logs --member=allUsers --role=roles/storage.objectViewer

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, SOC 2 CC7.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Multi Critical New
CHG0030009 · SEC-1851
[TITAN] Critical — security on csql-titan-orders
Resource: csql-titan-orders
Assignment: database_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1PCI DSS 3.5
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Cloud SQL 'csql-titan-orders' has ssl_mode=ALLOW (accepts unencrypted connections) and no customer-managed encryption key — order data at rest is only provider-encrypted.

JUSTIFICATION

Cloud SQL 'csql-titan-orders' has ssl_mode=ALLOW (accepts unencrypted connections) and no customer-managed encryption key — order data at rest is only provider-encrypted.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   gcloud sql instances patch csql-titan-orders --require-ssl --disk-encryption-key-name=projects/titan-ai-prod-882017/locations/us-central1/keyRings/titan-kr/cryptoKeys/titan-db-key
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: HIGH business risk — active exposure; fix required immediately.
Business impact if unremediated: Potential data exfil, privilege escalation, or compliance breach.
Scope: single resource (csql-titan-orders).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Cloud SQL 'csql-titan-orders' has ssl_mode=ALLOW (accepts unencrypted connections) and no customer-managed encryption key — order data at rest is only provider-encrypted.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of csql-titan-orders before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans csql-titan-orders immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

gcloud sql instances patch csql-titan-orders --require-ssl --disk-encryption-key-name=projects/titan-ai-prod-882017/locations/us-central1/keyRings/titan-kr/cryptoKeys/titan-db-key
ATTACHED SERVICENOW TICKET
SEC-1851 — [TITAN] Critical — security on csql-titan-orders
Priority: Critical TICKET Multi
Cloud SQL 'csql-titan-orders' has ssl_mode=ALLOW (accepts unencrypted connections) and no customer-managed encryption key — order data at rest is only provider-encrypted.

Recommended Fix:
  gcloud sql instances patch csql-titan-orders --require-ssl --disk-encryption-key-name=projects/titan-ai-prod-882017/locations/us-central1/keyRings/titan-kr/cryptoKeys/titan-db-key

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, PCI DSS 3.5

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Multi High New
CHG0030010 · SEC-4017
[TITAN] High — security on fw-allow-all-ingress
Resource: fw-allow-all-ingress
Assignment: network_operations
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS Azure 6.2NIST SC-7PCI DSS 1.2.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every compute instance is exposed to the internet.

JUSTIFICATION

GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every compute instance is exposed to the internet.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (fw-allow-all-ingress).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every compute instance is exposed to the internet.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of fw-allow-all-ingress before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans fw-allow-all-ingress immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16
ATTACHED SERVICENOW TICKET
SEC-4017 — [TITAN] High — security on fw-allow-all-ingress
Priority: High TICKET Multi
GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every compute instance is exposed to the internet.

Recommended Fix:
  gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Azure 6.2, NIST SC-7, PCI DSS 1.2.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030011 · SEC-2167
[TITAN] Critical — security on nsg-titan-webtier
Resource: nsg-titan-webtier
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222654Z).
Finding: NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly a...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny
ATTACHED SERVICENOW TICKET
SEC-2167 — [TITAN] Critical — security on nsg-titan-webtier
Priority: Critical TICKET Azure
NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

Recommended Fix:
  az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030012 · SEC-7912
[TITAN] Critical — security on stgpublicblob01
Resource: stgpublicblob01
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: HIPAA obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222654Z).
Finding: Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-lev...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Storage account 'stgpublicblob01' has allowBlobPublicAccess=... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false
ATTACHED SERVICENOW TICKET
SEC-7912 — [TITAN] Critical — security on stgpublicblob01
Priority: Critical TICKET Azure
Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

Recommended Fix:
  az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030013 · SEC-7027
[TITAN] Critical — security on sqldb-phi-members
Resource: sqldb-phi-members
Assignment: database_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: HIPAA obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222654Z).
Finding: SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryp...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of SQL database 'sqldb-phi-members' containing PHI has TDE (Tra... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled
ATTACHED SERVICENOW TICKET
SEC-7027 — [TITAN] Critical — security on sqldb-phi-members
Priority: Critical TICKET Azure
SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

Recommended Fix:
  az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical New
CHG0030014 · SEC-5607
[TITAN] Critical — security on role-finops-admin
Resource: role-finops-admin
Assignment: identity_and_access
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: NIST obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222654Z).
Finding: IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — o...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of IAM role 'role-finops-admin' has AdministratorAccess managed... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly
ATTACHED SERVICENOW TICKET
SEC-5607 — [TITAN] Critical — security on role-finops-admin
Priority: Critical TICKET AWS
IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

Recommended Fix:
  aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Multi Critical New
CHG0030015 · SEC-9293
[TITAN] Critical — security on fw-allow-all-ingress
Resource: fw-allow-all-ingress
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.

Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222654Z).
Finding: GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to a...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCP firewall rule 'fw-allow-all-ingress' allows any protocol... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443
ATTACHED SERVICENOW TICKET
SEC-9293 — [TITAN] Critical — security on fw-allow-all-ingress
Priority: Critical TICKET Multi
GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

Recommended Fix:
  gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030016 · SEC-6825
[TITAN] Critical — security on nsg-titan-webtier
Resource: nsg-titan-webtier
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222819Z).
Finding: NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly a...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny
ATTACHED SERVICENOW TICKET
SEC-6825 — [TITAN] Critical — security on nsg-titan-webtier
Priority: Critical TICKET Azure
NSG rule 'AllowSSHAll' permits SSH (port 22) inbound from 0.0.0.0/0 — publicly accessible firewall opening. Every VM in this subnet is exposed to internet-wide SSH brute-force. CIS_AZURE_6.2 violation.

Recommended Fix:
  az network nsg rule update --name AllowSSHAll --nsg-name nsg-titan-webtier --resource-group rg-titan-demo --source-address-prefixes VirtualNetwork --access Deny

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030017 · SEC-6955
[TITAN] Critical — security on stgpublicblob01
Resource: stgpublicblob01
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: HIPAA obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222819Z).
Finding: Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-lev...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Storage account 'stgpublicblob01' has allowBlobPublicAccess=... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false
ATTACHED SERVICENOW TICKET
SEC-6955 — [TITAN] Critical — security on stgpublicblob01
Priority: Critical TICKET Azure
Storage account 'stgpublicblob01' has allowBlobPublicAccess=true — container-level public access possible. Publicly accessible storage creates data-exfiltration risk. HIPAA §164.312(e)(1) / PCI DSS 1.3.4 violation.

Recommended Fix:
  az storage account update --name stgpublicblob01 --resource-group rg-titan-demo --allow-blob-public-access false

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical New
CHG0030018 · SEC-7949
[TITAN] Critical — security on sqldb-phi-members
Resource: sqldb-phi-members
Assignment: database_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: HIPAA obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222819Z).
Finding: SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryp...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of SQL database 'sqldb-phi-members' containing PHI has TDE (Tra... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled
ATTACHED SERVICENOW TICKET
SEC-7949 — [TITAN] Critical — security on sqldb-phi-members
Priority: Critical TICKET Azure
SQL database 'sqldb-phi-members' containing PHI has TDE (Transparent Data Encryption) disabled. Unencrypted PHI at rest is a direct HIPAA §164.312(a)(2)(iv) violation.

Recommended Fix:
  az sql db tde set --database sqldb-phi-members --server sql-titan-prod --resource-group rg-titan-demo --status Enabled

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical New
CHG0030019 · SEC-9815
[TITAN] Critical — security on role-finops-admin
Resource: role-finops-admin
Assignment: identity_and_access
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: NIST obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222819Z).
Finding: IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — o...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of IAM role 'role-finops-admin' has AdministratorAccess managed... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly
ATTACHED SERVICENOW TICKET
SEC-9815 — [TITAN] Critical — security on role-finops-admin
Priority: Critical TICKET AWS
IAM role 'role-finops-admin' has AdministratorAccess managed policy attached — overly broad privilege for a finance operations role. Privilege escalation path if role is assumed by compromised identity.

Recommended Fix:
  aws iam detach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess; aws iam attach-role-policy --role-name role-finops-admin --policy-arn arn:aws:iam::450367038821:policy/FinOpsReadOnly

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Multi Critical New
CHG0030020 · SEC-8225
[TITAN] Critical — security on fw-allow-all-ingress
Resource: fw-allow-all-ingress
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.

Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-killer-20260421T222819Z).
Finding: GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to a...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCP firewall rule 'fw-allow-all-ingress' allows any protocol... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443
ATTACHED SERVICENOW TICKET
SEC-8225 — [TITAN] Critical — security on fw-allow-all-ingress
Priority: Critical TICKET Multi
GCP firewall rule 'fw-allow-all-ingress' allows any protocol from 0.0.0.0/0 to all VMs tagged 'default' — every GCE instance is publicly accessible over every port. Massive firewall misconfiguration.

Recommended Fix:
  gcloud compute firewall-rules update fw-allow-all-ingress --source-ranges=10.0.0.0/8,172.16.0.0/12,192.168.0.0/16 --allowed=tcp:22,tcp:443

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical Closed
CHG0030021 · SEC-7491
[TITAN] Critical — security on stgtitan1169
Resource: stgtitan1169
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Storage account 'stgtitan1169' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: Storage account 'stgtitan1169' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az storage account update --name stgtitan1169 --resource-group rg-titan-live-20260421t223919z --allow-blob-public-access false

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Storage account 'stgtitan1169' has allowBlobPublicAccess=true — publicly accessi...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Storage account 'stgtitan1169' has allowBlobPublicAccess=tru... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az storage account update --name stgtitan1169 --resource-group rg-titan-live-20260421t223919z --allow-blob-public-access false
ATTACHED SERVICENOW TICKET
SEC-7491 — [TITAN] Critical — security on stgtitan1169
Priority: Critical TICKET Azure
Storage account 'stgtitan1169' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

Recommended Fix:
  az storage account update --name stgtitan1169 --resource-group rg-titan-live-20260421t223919z --allow-blob-public-access false

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical Closed
CHG0030022 · SEC-2492
[TITAN] Critical — security on nsg-titan-webtier-20260421t223919z
Resource: nsg-titan-webtier-20260421t223919z
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG 'nsg-titan-webtier-20260421t223919z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: NSG 'nsg-titan-webtier-20260421t223919z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t223919z --resource-group rg-titan-live-20260421t223919z --name AllowSSHAll

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (NSG 'nsg-titan-webtier-20260421t223919z' rule 'AllowSSHAll' permits SSH (port 22...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of NSG 'nsg-titan-webtier-20260421t223919z' rule 'AllowSSHAll' ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t223919z --resource-group rg-titan-live-20260421t223919z --name AllowSSHAll
ATTACHED SERVICENOW TICKET
SEC-2492 — [TITAN] Critical — security on nsg-titan-webtier-20260421t223919z
Priority: Critical TICKET Azure
NSG 'nsg-titan-webtier-20260421t223919z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

Recommended Fix:
  az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t223919z --resource-group rg-titan-live-20260421t223919z --name AllowSSHAll

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure High Closed
CHG0030023 · SEC-9693
[TITAN] High — security on kv-titan-1211
Resource: kv-titan-1211
Assignment: security_engineering
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
PCI DSS 3.5HIPAA §164.312(a)(2)(iv)
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Key Vault 'kv-titan-1211' has purge protection DISABLED. Destroyed secrets unrecoverable. CIS_AZURE_8.2 hardening gap.

JUSTIFICATION

Severity assessment: HIGH — material compliance gap or high-probability exploit vector. team approval required.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: Key Vault 'kv-titan-1211' has purge protection DISABLED. Destroyed secrets unrecoverable. CIS_AZURE_8.2 hardening gap.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az keyvault update --name kv-titan-1211 --resource-group rg-titan-live-20260421t223919z --enable-purge-protection true

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: MEDIUM (standard change with defined rollback)

Blast radius: The change is scoped to a single cloud resource (Key Vault 'kv-titan-1211' has purge protection DISABLED. Destroyed secrets unrec...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Pre-change snapshot + automated rollback keeps risk bounded. Apply in next window.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Key Vault 'kv-titan-1211' has purge protection DISABLED. Des... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az keyvault update --name kv-titan-1211 --resource-group rg-titan-live-20260421t223919z --enable-purge-protection true
ATTACHED SERVICENOW TICKET
SEC-9693 — [TITAN] High — security on kv-titan-1211
Priority: High TICKET Azure
Key Vault 'kv-titan-1211' has purge protection DISABLED. Destroyed secrets unrecoverable. CIS_AZURE_8.2 hardening gap.

Recommended Fix:
  az keyvault update --name kv-titan-1211 --resource-group rg-titan-live-20260421t223919z --enable-purge-protection true

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  PCI DSS 3.5, HIPAA §164.312(a)(2)(iv)

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical Closed
CHG0030024 · SEC-3854
[TITAN] Critical — security on titan-live-20260421t223919z-public-exports
Resource: titan-live-20260421t223919z-public-exports
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

S3 bucket 'titan-live-20260421t223919z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: S3 bucket 'titan-live-20260421t223919z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws s3api put-public-access-block --bucket titan-live-20260421t223919z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (S3 bucket 'titan-live-20260421t223919z-public-exports' has public-access-block D...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of S3 bucket 'titan-live-20260421t223919z-public-exports' has p... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws s3api put-public-access-block --bucket titan-live-20260421t223919z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true
ATTACHED SERVICENOW TICKET
SEC-3854 — [TITAN] Critical — security on titan-live-20260421t223919z-public-exports
Priority: Critical TICKET AWS
S3 bucket 'titan-live-20260421t223919z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

Recommended Fix:
  aws s3api put-public-access-block --bucket titan-live-20260421t223919z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical Closed
CHG0030025 · SEC-3374
[TITAN] Critical — security on titan-live-20260421t223919z-rds-sg
Resource: titan-live-20260421t223919z-rds-sg
Assignment: security_engineering
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Security group 'titan-live-20260421t223919z-rds-sg' (ID sg-09f893e4ace45e362) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: Security group 'titan-live-20260421t223919z-rds-sg' (ID sg-09f893e4ace45e362) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws ec2 revoke-security-group-ingress --group-id sg-09f893e4ace45e362 --protocol tcp --port 3306 --cidr 0.0.0.0/0

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Security group 'titan-live-20260421t223919z-rds-sg' (ID sg-09f893e4ace45e362) al...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Security group 'titan-live-20260421t223919z-rds-sg' (ID sg-0... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws ec2 revoke-security-group-ingress --group-id sg-09f893e4ace45e362 --protocol tcp --port 3306 --cidr 0.0.0.0/0
ATTACHED SERVICENOW TICKET
SEC-3374 — [TITAN] Critical — security on titan-live-20260421t223919z-rds-sg
Priority: Critical TICKET AWS
Security group 'titan-live-20260421t223919z-rds-sg' (ID sg-09f893e4ace45e362) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

Recommended Fix:
  aws ec2 revoke-security-group-ingress --group-id sg-09f893e4ace45e362 --protocol tcp --port 3306 --cidr 0.0.0.0/0

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET GCP Critical Closed
CHG0030026 · SEC-2884
[TITAN] Critical — security on gs-titan-public-1289
Resource: gs-titan-public-1289
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCS bucket 'gs-titan-public-1289' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: GCS bucket 'gs-titan-public-1289' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1289 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (GCS bucket 'gs-titan-public-1289' has allUsers:objectViewer — every object publi...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCS bucket 'gs-titan-public-1289' has allUsers:objectViewer ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1289 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522
ATTACHED SERVICENOW TICKET
SEC-2884 — [TITAN] Critical — security on gs-titan-public-1289
Priority: Critical TICKET GCP
GCS bucket 'gs-titan-public-1289' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

Recommended Fix:
  gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1289 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET GCP High Closed
CHG0030027 · SEC-1304
[TITAN] High — security on gs-titan-legacy-1314
Resource: gs-titan-legacy-1314
Assignment: infrastructure_operations
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCS bucket 'gs-titan-legacy-1314' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

JUSTIFICATION

Severity assessment: HIGH — material compliance gap or high-probability exploit vector. team approval required.
Regulatory driver: SOC 2 obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T223919Z).
Finding: GCS bucket 'gs-titan-legacy-1314' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud storage buckets update gs://gs-titan-legacy-1314 --uniform-bucket-level-access --project=adroit-terminus-234522

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: MEDIUM (standard change with defined rollback)

Blast radius: The change is scoped to a single cloud resource (GCS bucket 'gs-titan-legacy-1314' is not using uniform bucket-level access — leg...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Pre-change snapshot + automated rollback keeps risk bounded. Apply in next window.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCS bucket 'gs-titan-legacy-1314' is not using uniform bucke... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud storage buckets update gs://gs-titan-legacy-1314 --uniform-bucket-level-access --project=adroit-terminus-234522
ATTACHED SERVICENOW TICKET
SEC-1304 — [TITAN] High — security on gs-titan-legacy-1314
Priority: High TICKET GCP
GCS bucket 'gs-titan-legacy-1314' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

Recommended Fix:
  gcloud storage buckets update gs://gs-titan-legacy-1314 --uniform-bucket-level-access --project=adroit-terminus-234522

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical Closed
CHG0030028 · SEC-9291
[TITAN] Critical — security on stgtitan1766
Resource: stgtitan1766
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Storage account 'stgtitan1766' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: Storage account 'stgtitan1766' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az storage account update --name stgtitan1766 --resource-group rg-titan-live-20260421t224916z --allow-blob-public-access false

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Storage account 'stgtitan1766' has allowBlobPublicAccess=true — publicly accessi...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Storage account 'stgtitan1766' has allowBlobPublicAccess=tru... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az storage account update --name stgtitan1766 --resource-group rg-titan-live-20260421t224916z --allow-blob-public-access false
ATTACHED SERVICENOW TICKET
SEC-9291 — [TITAN] Critical — security on stgtitan1766
Priority: Critical TICKET Azure
Storage account 'stgtitan1766' has allowBlobPublicAccess=true — publicly accessible. CIS_AZURE_3.7 violation.

Recommended Fix:
  az storage account update --name stgtitan1766 --resource-group rg-titan-live-20260421t224916z --allow-blob-public-access false

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical Closed
CHG0030029 · SEC-6412
[TITAN] Critical — security on nsg-titan-webtier-20260421t224916z
Resource: nsg-titan-webtier-20260421t224916z
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG 'nsg-titan-webtier-20260421t224916z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: NSG 'nsg-titan-webtier-20260421t224916z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowSSHAll

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (NSG 'nsg-titan-webtier-20260421t224916z' rule 'AllowSSHAll' permits SSH (port 22...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of NSG 'nsg-titan-webtier-20260421t224916z' rule 'AllowSSHAll' ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowSSHAll
ATTACHED SERVICENOW TICKET
SEC-6412 — [TITAN] Critical — security on nsg-titan-webtier-20260421t224916z
Priority: Critical TICKET Azure
NSG 'nsg-titan-webtier-20260421t224916z' rule 'AllowSSHAll' permits SSH (port 22) from Internet — publicly accessible firewall opening. CIS_AZURE_6.2 violation.

Recommended Fix:
  az network nsg rule delete --nsg-name nsg-titan-webtier-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowSSHAll

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Critical Closed
CHG0030030 · SEC-2953
[TITAN] Critical — security on nsg-titan-lab-20260421t224916z
Resource: nsg-titan-lab-20260421t224916z
Assignment: network_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
CIS Azure 6.2NIST SC-7PCI DSS 1.2.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

NSG 'nsg-titan-lab-20260421t224916z' rule 'AllowAny' permits ALL protocols on ALL ports from Internet — equivalent to no firewall. HIPAA §164.312(e)(1) transmission-security violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: HIPAA obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: NSG 'nsg-titan-lab-20260421t224916z' rule 'AllowAny' permits ALL protocols on ALL ports from Internet — equivalent to no firewall. HIPAA §164.312(e)(1) transmission-security violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   az network nsg rule delete --nsg-name nsg-titan-lab-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowAny

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (NSG 'nsg-titan-lab-20260421t224916z' rule 'AllowAny' permits ALL protocols on AL...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of NSG 'nsg-titan-lab-20260421t224916z' rule 'AllowAny' permits... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

az network nsg rule delete --nsg-name nsg-titan-lab-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowAny
ATTACHED SERVICENOW TICKET
SEC-2953 — [TITAN] Critical — security on nsg-titan-lab-20260421t224916z
Priority: Critical TICKET Azure
NSG 'nsg-titan-lab-20260421t224916z' rule 'AllowAny' permits ALL protocols on ALL ports from Internet — equivalent to no firewall. HIPAA §164.312(e)(1) transmission-security violation.

Recommended Fix:
  az network nsg rule delete --nsg-name nsg-titan-lab-20260421t224916z --resource-group rg-titan-live-20260421t224916z --name AllowAny

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Azure 6.2, NIST SC-7, PCI DSS 1.2.1

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET Azure Low Closed
CHG0030031 · SEC-2654
[TITAN] Low — security on titan-demo-1896.local
Resource: titan-demo-1896.local
Assignment: network_operations
Priority: 4 - Low
Change type: Normal
Approval required: No
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:56 UTC
Close code: Successful
CIS BenchmarkSOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Public DNS zone 'titan-demo-1896.local' was created without DNSSEC signing. DNS queries for this zone can be spoofed. CIS_AZURE_6.8.

JUSTIFICATION

Severity assessment: LOW — hygiene/best-practice drift; low business risk if deferred by one cycle.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: Public DNS zone 'titan-demo-1896.local' was created without DNSSEC signing. DNS queries for this zone can be spoofed. CIS_AZURE_6.8.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   Enable DNSSEC signing on zone (Azure Preview feature) OR consider using Azure Private DNS if zone is internal-only.

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: LOW (routine hardening)

Blast radius: The change is scoped to a single cloud resource (Public DNS zone 'titan-demo-1896.local' was created without DNSSEC signing. DNS ...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Minimal blast radius. Safe to batch with other low-risk changes.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Public DNS zone 'titan-demo-1896.local' was created without ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

Enable DNSSEC signing on zone (Azure Preview feature) OR consider using Azure Private DNS if zone is internal-only.
ATTACHED SERVICENOW TICKET
SEC-2654 — [TITAN] Low — security on titan-demo-1896.local
Priority: Low TICKET Azure
Public DNS zone 'titan-demo-1896.local' was created without DNSSEC signing. DNS queries for this zone can be spoofed. CIS_AZURE_6.8.

Recommended Fix:
  Enable DNSSEC signing on zone (Azure Preview feature) OR consider using Azure Private DNS if zone is internal-only.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Benchmark, SOC 2 CC6.1

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical Closed
CHG0030032 · SEC-4297
[TITAN] Critical — security on titan-live-20260421t224916z-public-exports
Resource: titan-live-20260421t224916z-public-exports
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

S3 bucket 'titan-live-20260421t224916z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: S3 bucket 'titan-live-20260421t224916z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws s3api put-public-access-block --bucket titan-live-20260421t224916z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (S3 bucket 'titan-live-20260421t224916z-public-exports' has public-access-block D...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of S3 bucket 'titan-live-20260421t224916z-public-exports' has p... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws s3api put-public-access-block --bucket titan-live-20260421t224916z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true
ATTACHED SERVICENOW TICKET
SEC-4297 — [TITAN] Critical — security on titan-live-20260421t224916z-public-exports
Priority: Critical TICKET AWS
S3 bucket 'titan-live-20260421t224916z-public-exports' has public-access-block DISABLED — objects in this bucket can be made publicly accessible. CIS_AWS_2.1.5 violation.

Recommended Fix:
  aws s3api put-public-access-block --bucket titan-live-20260421t224916z-public-exports --public-access-block-configuration BlockPublicAcls=true,BlockPublicPolicy=true,IgnorePublicAcls=true,RestrictPublicBuckets=true

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Critical Closed
CHG0030033 · SEC-7164
[TITAN] Critical — security on titan-live-20260421t224916z-rds-sg
Resource: titan-live-20260421t224916z-rds-sg
Assignment: security_engineering
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
CIS 1.x IAMNIST AC-2SOC 2 CC6.1CIS Azure 6.2
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Security group 'titan-live-20260421t224916z-rds-sg' (ID sg-0131bd6f435d87962) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: Security group 'titan-live-20260421t224916z-rds-sg' (ID sg-0131bd6f435d87962) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws ec2 revoke-security-group-ingress --group-id sg-0131bd6f435d87962 --protocol tcp --port 3306 --cidr 0.0.0.0/0

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (Security group 'titan-live-20260421t224916z-rds-sg' (ID sg-0131bd6f435d87962) al...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Security group 'titan-live-20260421t224916z-rds-sg' (ID sg-0... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws ec2 revoke-security-group-ingress --group-id sg-0131bd6f435d87962 --protocol tcp --port 3306 --cidr 0.0.0.0/0
ATTACHED SERVICENOW TICKET
SEC-7164 — [TITAN] Critical — security on titan-live-20260421t224916z-rds-sg
Priority: Critical TICKET AWS
Security group 'titan-live-20260421t224916z-rds-sg' (ID sg-0131bd6f435d87962) allows MySQL (port 3306) from 0.0.0.0/0 — publicly accessible firewall opening to databases. CIS_AWS_5.2 violation.

Recommended Fix:
  aws ec2 revoke-security-group-ingress --group-id sg-0131bd6f435d87962 --protocol tcp --port 3306 --cidr 0.0.0.0/0

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, CIS Azure 6.2

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET AWS Low Closed
CHG0030034 · SEC-4715
[TITAN] Low — security on titan-live-20260421t224916z-egress-all
Resource: titan-live-20260421t224916z-egress-all
Assignment: security_engineering
Priority: 4 - Low
Change type: Normal
Approval required: No
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
CIS Azure 6.2NIST SC-7PCI DSS 1.2.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Security group 'titan-live-20260421t224916z-egress-all' has default unrestricted egress (0.0.0.0/0 all protocols). Data-exfiltration risk if any workload in this SG is compromised.

JUSTIFICATION

Severity assessment: LOW — hygiene/best-practice drift; low business risk if deferred by one cycle.

Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: Security group 'titan-live-20260421t224916z-egress-all' has default unrestricted egress (0.0.0.0/0 all protocols). Data-exfiltration risk if any workload in this SG is compromised.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   aws ec2 revoke-security-group-egress --group-id sg-06b658fbb0e95b3ba --protocol -1 --cidr 0.0.0.0/0; then add specific egress rules.

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: LOW (routine hardening)

Blast radius: The change is scoped to a single cloud resource (Security group 'titan-live-20260421t224916z-egress-all' has default unrestricted...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Minimal blast radius. Safe to batch with other low-risk changes.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of Security group 'titan-live-20260421t224916z-egress-all' has ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

aws ec2 revoke-security-group-egress --group-id sg-06b658fbb0e95b3ba --protocol -1 --cidr 0.0.0.0/0; then add specific egress rules.
ATTACHED SERVICENOW TICKET
SEC-4715 — [TITAN] Low — security on titan-live-20260421t224916z-egress-all
Priority: Low TICKET AWS
Security group 'titan-live-20260421t224916z-egress-all' has default unrestricted egress (0.0.0.0/0 all protocols). Data-exfiltration risk if any workload in this SG is compromised.

Recommended Fix:
  aws ec2 revoke-security-group-egress --group-id sg-06b658fbb0e95b3ba --protocol -1 --cidr 0.0.0.0/0; then add specific egress rules.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Azure 6.2, NIST SC-7, PCI DSS 1.2.1

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET GCP Critical Closed
CHG0030035 · SEC-6358
[TITAN] Critical — security on gs-titan-public-1974
Resource: gs-titan-public-1974
Assignment: infrastructure_operations
Priority: 1 - Critical
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCS bucket 'gs-titan-public-1974' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

JUSTIFICATION

Severity assessment: CRITICAL — active exploit path, 0-day or internet-exposed asset. Meets ITIL 'security emergency' threshold.
Regulatory driver: CIS obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: GCS bucket 'gs-titan-public-1974' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1974 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: HIGH (change risk: severity overrides defer-ability)

Blast radius: The change is scoped to a single cloud resource (GCS bucket 'gs-titan-public-1974' has allUsers:objectViewer — every object publi...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Applying this fix during business hours is acceptable given exploit exposure.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCS bucket 'gs-titan-public-1974' has allUsers:objectViewer ... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1974 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522
ATTACHED SERVICENOW TICKET
SEC-6358 — [TITAN] Critical — security on gs-titan-public-1974
Priority: Critical TICKET GCP
GCS bucket 'gs-titan-public-1974' has allUsers:objectViewer — every object publicly accessible on the internet. CIS_GCP_5.1 violation, GDPR exposure risk.

Recommended Fix:
  gcloud storage buckets remove-iam-policy-binding gs://gs-titan-public-1974 --member=allUsers --role=roles/storage.objectViewer --project=adroit-terminus-234522

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
TICKET GCP High Closed
CHG0030036 · SEC-9247
[TITAN] High — security on gs-titan-legacy-1996
Resource: gs-titan-legacy-1996
Assignment: infrastructure_operations
Priority: 2 - High
Change type: Normal
Approval required: Yes
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:57 UTC
Close code: Successful
HIPAA §164.312(e)(1)PCI DSS 3.4SOC 2 CC6.1CIS 1.x IAM
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCS bucket 'gs-titan-legacy-1996' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

JUSTIFICATION

Severity assessment: HIGH — material compliance gap or high-probability exploit vector. team approval required.
Regulatory driver: SOC 2 obligation.
Risk if deferred: Per industry telemetry, mean time to exploit a publicly-reachable misconfiguration of this class is measured in hours. Delaying this change extends exposure window and increases breach cost per IBM Cost of a Data Breach Report (avg $4.45M per incident).

Detected by: TITAN AI agent unknown (scan titan-3cloud-20260421T224916Z).
Finding: GCS bucket 'gs-titan-legacy-1996' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

IMPLEMENTATION PLAN

1. PRE-CHANGE VERIFICATION (5 min)
   - Confirm TITAN pre-scan snapshot captured; snapshot ID in work notes.
   - Confirm no blocking dependencies (check 'Affected CIs' below).
   - Announce change start in #ops-change Slack channel.

2. APPLY FIX (primary command, auto-generated by TITAN):
   gcloud storage buckets update gs://gs-titan-legacy-1996 --uniform-bucket-level-access --project=adroit-terminus-234522

3. POST-CHANGE VERIFICATION (5 min)
   - Re-run TITAN targeted scan on the affected resource.
   - Confirm finding cleared (scan returns 0 matches for this finding_id).
   - Smoke-test dependent applications (see Test plan).

4. CLOSE
   - Update ticket state to Review -> Closed.
   - Attach scan-diff evidence (pre vs post).
   - If verification fails at step 3, execute Backout plan immediately.

RISK & IMPACT ANALYSIS

Change risk level: MEDIUM (standard change with defined rollback)

Blast radius: The change is scoped to a single cloud resource (GCS bucket 'gs-titan-legacy-1996' is not using uniform bucket-level access — leg...). Downstream dependencies (if any) are listed under 'Affected CIs'.

Pre-change snapshot + automated rollback keeps risk bounded. Apply in next window.

Worst-case failure mode: Change is rejected by the cloud API (network partition or permission drift). Impact: no state change on target resource; Backout plan is a no-op. Time to detect: immediate (non-zero exit code from fix command).

Residual risk after successful fix: zero — the finding no longer exists. TITAN verifies this via post-change scan (see Implementation plan step 3).

BACKOUT / ROLLBACK PLAN

If post-change verification fails or the fix causes a service disruption:

1. IMMEDIATE: Revert the resource to its pre-change state using the TITAN pre-scan snapshot (snapshot ID recorded in work notes at scan time).
2. Azure:  az <resource-type> update ... (inverse of the apply command) OR az deployment group create --template-uri <pre-change ARM URI>
3. AWS:    aws <service> ... (restore from snapshot or inverse IAM policy)
4. GCP:    gcloud <service> ... update --rollback
5. Confirm rollback succeeded by re-running TITAN scan — the original finding should reappear (confirming the state was fully reverted).
6. Document the failure mode in 'Close notes' for the post-incident review.
7. Re-open this change with 'Rejected' disposition and spawn a parent Problem ticket for root-cause analysis.

TEST PLAN

Acceptance criteria (must all PASS to close this change):

[ ] TITAN targeted re-scan of GCS bucket 'gs-titan-legacy-1996' is not using uniform bucke... returns ZERO matches for this finding_id.
[ ] Resource remains in provisioning_state=Succeeded (Azure) / available (AWS) / RUNNING (GCP) immediately after change.
[ ] Dependent applications pass smoke tests (HTTP 200 on health endpoints, auth still works for service accounts, DB connection-strings unchanged).
[ ] No new alerts raised in Azure Monitor / CloudWatch / Cloud Monitoring in the 30 minutes following the change.
[ ] Audit chain entry written: agent.change.applied event with pre/post hashes.

Any FAIL triggers the Backout plan above. Evidence attached to 'Closure Information' tab.

RECOMMENDED FIX COMMAND

gcloud storage buckets update gs://gs-titan-legacy-1996 --uniform-bucket-level-access --project=adroit-terminus-234522
ATTACHED SERVICENOW TICKET
SEC-9247 — [TITAN] High — security on gs-titan-legacy-1996
Priority: High TICKET GCP
GCS bucket 'gs-titan-legacy-1996' is not using uniform bucket-level access — legacy per-object ACLs enabled. Audit gap + inconsistent access control surface. CIS_GCP_5.2.

Recommended Fix:
  gcloud storage buckets update gs://gs-titan-legacy-1996 --uniform-bucket-level-access --project=adroit-terminus-234522

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  HIPAA §164.312(e)(1), PCI DSS 3.4, SOC 2 CC6.1, CIS 1.x IAM

AI CLOSE NOTES

[TITAN FORGE] Fix command executed, post-scan verification PASS. No rollback required. Change closed successfully.
DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT AWS High New
INC0010003 · SEC-4950
[TITAN] High — security on iam-user-titan-svc-backup
Resource: iam-user-titan-svc-backup
Assignment: identity_and_access
Priority: 3 - Moderate
Change type: Incident
Approval required: Yes
Opened by AI: 2026-04-21 14:36 UTC
Closed by AI: 2026-04-21 14:36 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1PCI DSS 3.5
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM user 'iam-user-titan-svc-backup' has no MFA enabled and 180-day-old access keys — credential compromise likelihood elevated.

JUSTIFICATION

High: IAM user 'iam-user-titan-svc-backup' has no MFA enabled and 180-day-old access keys — credential compromise likelihood elevated.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   aws iam update-access-key --user-name iam-user-titan-svc-backup --access-key-id AKIA... --status Inactive && aws iam create-access-key --user-name iam-user-titan-svc-backup
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (iam-user-titan-svc-backup).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: IAM user 'iam-user-titan-svc-backup' has no MFA enabled and 180-day-old access keys — credential compromise likelihood elevated.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of iam-user-titan-svc-backup before change (baseline: titan-live-demo-20260421T213642Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans iam-user-titan-svc-backup immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

aws iam update-access-key --user-name iam-user-titan-svc-backup --access-key-id AKIA... --status Inactive && aws iam create-access-key --user-name iam-user-titan-svc-backup
ATTACHED SERVICENOW INCIDENT
SEC-4950 — [TITAN] High — security on iam-user-titan-svc-backup
Priority: High INCIDENT AWS
IAM user 'iam-user-titan-svc-backup' has no MFA enabled and 180-day-old access keys — credential compromise likelihood elevated.

Recommended Fix:
  aws iam update-access-key --user-name iam-user-titan-svc-backup --access-key-id AKIA... --status Inactive && aws iam create-access-key --user-name iam-user-titan-svc-backup

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, PCI DSS 3.5

AI CLOSE NOTES

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT AWS High New
INC0010004 · SEC-1242
[TITAN] High — security on iam-user-svc-backup
Resource: iam-user-svc-backup
Assignment: identity_and_access
Priority: 3 - Moderate
Change type: Incident
Approval required: Yes
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1PCI DSS 3.5
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

JUSTIFICATION

High: IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (iam-user-svc-backup).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of iam-user-svc-backup before change (baseline: titan-killer-20260421T222654Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans iam-user-svc-backup immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.
ATTACHED SERVICENOW INCIDENT
SEC-1242 — [TITAN] High — security on iam-user-svc-backup
Priority: High INCIDENT AWS
IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

Recommended Fix:
  aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, PCI DSS 3.5

AI CLOSE NOTES

2026-04-21 15:26:54 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222654Z).
Severity: High (priority 2).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Medium New
INC0010005 · SEC-4897
[TITAN] Medium — security on mi-orphan-app1
Resource: mi-orphan-app1
Assignment: identity_and_access
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

JUSTIFICATION

Medium: Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (mi-orphan-app1).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of mi-orphan-app1 before change (baseline: titan-killer-20260421T222654Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans mi-orphan-app1 immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).
ATTACHED SERVICENOW INCIDENT
SEC-4897 — [TITAN] Medium — security on mi-orphan-app1
Priority: Medium INCIDENT Azure
Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

Recommended Fix:
  az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:26:54 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222654Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Medium New
INC0010006 · SEC-1444
[TITAN] Medium — security on u-jsmith-contractor
Resource: u-jsmith-contractor
Assignment: security_engineering
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS BenchmarkSOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

JUSTIFICATION

Medium: Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (u-jsmith-contractor).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of u-jsmith-contractor before change (baseline: titan-killer-20260421T222654Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans u-jsmith-contractor immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.
ATTACHED SERVICENOW INCIDENT
SEC-1444 — [TITAN] Medium — security on u-jsmith-contractor
Priority: Medium INCIDENT Azure
Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

Recommended Fix:
  Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Benchmark, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:26:55 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222654Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Low New
INC0010007 · SEC-3897
[TITAN] Low — security on alerts-prod-missing-rbac
Resource: alerts-prod-missing-rbac
Assignment: identity_and_access
Priority: 5 - Planning
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:26 UTC
Closed by AI: 2026-04-21 15:26 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

JUSTIFICATION

Low: No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: LOW risk — hygiene item, fix during normal maintenance.
Business impact if unremediated: Minor deviation from baseline.
Scope: single resource (alerts-prod-missing-rbac).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of alerts-prod-missing-rbac before change (baseline: titan-killer-20260421T222654Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans alerts-prod-missing-rbac immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write
ATTACHED SERVICENOW INCIDENT
SEC-3897 — [TITAN] Low — security on alerts-prod-missing-rbac
Priority: Low INCIDENT Azure
No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

Recommended Fix:
  az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:26:55 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222654Z).
Severity: Low (priority 4).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT AWS High New
INC0010008 · SEC-1448
[TITAN] High — security on iam-user-svc-backup
Resource: iam-user-svc-backup
Assignment: identity_and_access
Priority: 3 - Moderate
Change type: Incident
Approval required: Yes
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1PCI DSS 3.5
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

JUSTIFICATION

High: IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM-HIGH risk — misconfiguration with realistic exploit path.
Business impact if unremediated: Increases attack surface; auditor finding likely.
Scope: single resource (iam-user-svc-backup).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of iam-user-svc-backup before change (baseline: titan-killer-20260421T222819Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans iam-user-svc-backup immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.
ATTACHED SERVICENOW INCIDENT
SEC-1448 — [TITAN] High — security on iam-user-svc-backup
Priority: High INCIDENT AWS
IAM user 'iam-user-svc-backup' has MFA disabled and 180-day-old access keys. Human service account posture non-compliant with CIS_AWS_1.14.

Recommended Fix:
  aws iam update-access-key --user-name iam-user-svc-backup --access-key-id AKIA... --status Inactive; aws iam create-access-key --user-name iam-user-svc-backup; rotate credentials in callers within 24h.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, PCI DSS 3.5

AI CLOSE NOTES

2026-04-21 15:28:19 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222819Z).
Severity: High (priority 2).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Medium New
INC0010009 · SEC-1663
[TITAN] Medium — security on mi-orphan-app1
Resource: mi-orphan-app1
Assignment: identity_and_access
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

JUSTIFICATION

Medium: Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (mi-orphan-app1).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of mi-orphan-app1 before change (baseline: titan-killer-20260421T222819Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans mi-orphan-app1 immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).
ATTACHED SERVICENOW INCIDENT
SEC-1663 — [TITAN] Medium — security on mi-orphan-app1
Priority: Medium INCIDENT Azure
Managed identity 'mi-orphan-app1' has no role assignments for past 90 days. Orphaned credentials widen attack surface.

Recommended Fix:
  az identity delete --name mi-orphan-app1 --resource-group rg-titan-demo (after confirming no consumers).

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:28:20 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222819Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Medium New
INC0010010 · SEC-5533
[TITAN] Medium — security on u-jsmith-contractor
Resource: u-jsmith-contractor
Assignment: security_engineering
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS BenchmarkSOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

JUSTIFICATION

Medium: Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (u-jsmith-contractor).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of u-jsmith-contractor before change (baseline: titan-killer-20260421T222819Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans u-jsmith-contractor immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.
ATTACHED SERVICENOW INCIDENT
SEC-5533 — [TITAN] Medium — security on u-jsmith-contractor
Priority: Medium INCIDENT Azure
Azure AD user 'u-jsmith-contractor' has not signed in for 120 days. Per company policy, contractor accounts dormant >90d must be disabled.

Recommended Fix:
  Disable AAD user account pending HR review. Revoke all app assignments and OAuth grants.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS Benchmark, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:28:20 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222819Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT Azure Low New
INC0010011 · SEC-7290
[TITAN] Low — security on alerts-prod-missing-rbac
Resource: alerts-prod-missing-rbac
Assignment: identity_and_access
Priority: 5 - Planning
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:28 UTC
Closed by AI: 2026-04-21 15:28 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

JUSTIFICATION

Low: No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: LOW risk — hygiene item, fix during normal maintenance.
Business impact if unremediated: Minor deviation from baseline.
Scope: single resource (alerts-prod-missing-rbac).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of alerts-prod-missing-rbac before change (baseline: titan-killer-20260421T222819Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans alerts-prod-missing-rbac immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write
ATTACHED SERVICENOW INCIDENT
SEC-7290 — [TITAN] Low — security on alerts-prod-missing-rbac
Priority: Low INCIDENT Azure
No alert rule exists for 'Role Assignment Created at Subscription scope'. Detection gap for privilege escalation.

Recommended Fix:
  az monitor activity-log alert create --name rbac-subscription-scope --condition category=Administrative AND operationName=Microsoft.Authorization/roleAssignments/write

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:28:20 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-killer-20260421T222819Z).
Severity: Low (priority 4).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT AWS Medium New
INC0010012 · SEC-1029
[TITAN] Medium — security on titan-live-20260421t223919z-svc-backup
Resource: titan-live-20260421t223919z-svc-backup
Assignment: identity_and_access
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:42 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM user 'titan-live-20260421t223919z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

JUSTIFICATION

Medium: IAM user 'titan-live-20260421t223919z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   Enforce MFA on user titan-live-20260421t223919z-svc-backup or rotate to SSO-backed identity. Audit last access date.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (titan-live-20260421t223919z-svc-backup).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: IAM user 'titan-live-20260421t223919z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of titan-live-20260421t223919z-svc-backup before change (baseline: titan-3cloud-20260421T223919Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans titan-live-20260421t223919z-svc-backup immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

Enforce MFA on user titan-live-20260421t223919z-svc-backup or rotate to SSO-backed identity. Audit last access date.
ATTACHED SERVICENOW INCIDENT
SEC-1029 — [TITAN] Medium — security on titan-live-20260421t223919z-svc-backup
Priority: Medium INCIDENT AWS
IAM user 'titan-live-20260421t223919z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

Recommended Fix:
  Enforce MFA on user titan-live-20260421t223919z-svc-backup or rotate to SSO-backed identity. Audit last access date.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:42:20 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-3cloud-20260421T223919Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT GCP Medium New
INC0010013 · SEC-8099
[TITAN] Medium — security on sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceacco
Resource: sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceacco
Assignment: identity_and_access
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:42 UTC
Closed by AI: 2026-04-21 15:42 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1PCI DSS 3.5
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

GCP service account 'sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com' has no usage in 120 days and no key rotation schedule. Orphan credentials widen credential-theft blast radius.

JUSTIFICATION

Medium: GCP service account 'sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com' has no usage in 120 days and no key rotation schedule. Orphan credentials widen credential-theft blast radius.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   gcloud iam service-accounts delete sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com --project=adroit-terminus-234522 (after confirming no active consumers).
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: GCP service account 'sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com' has no usage in 120 days and no key rotation schedule. Orphan credentials widen credential-theft blast radius.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com before change (baseline: titan-3cloud-20260421T223919Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

gcloud iam service-accounts delete sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com --project=adroit-terminus-234522 (after confirming no active consumers).
ATTACHED SERVICENOW INCIDENT
SEC-8099 — [TITAN] Medium — security on sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceacco
Priority: Medium INCIDENT GCP
GCP service account 'sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com' has no usage in 120 days and no key rotation schedule. Orphan credentials widen credential-theft blast radius.

Recommended Fix:
  gcloud iam service-accounts delete sa-titan-orphan-1324@adroit-terminus-234522.iam.gserviceaccount.com --project=adroit-terminus-234522 (after confirming no active consumers).

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1, PCI DSS 3.5

AI CLOSE NOTES

2026-04-21 15:42:21 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-3cloud-20260421T223919Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX
INCIDENT AWS Medium New
INC0010014 · SEC-9203
[TITAN] Medium — security on titan-live-20260421t224916z-svc-backup
Resource: titan-live-20260421t224916z-svc-backup
Assignment: identity_and_access
Priority: 4 - Low
Change type: Incident
Approval required: No
Opened by AI: 2026-04-21 15:53 UTC
Closed by AI: 2026-04-21 15:53 UTC
Close code:
CIS 1.x IAMNIST AC-2SOC 2 CC6.1
SHOW FULL DRILL-DOWN +

THE SECURITY FINDING

IAM user 'titan-live-20260421t224916z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

JUSTIFICATION

Medium: IAM user 'titan-live-20260421t224916z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

IMPLEMENTATION PLAN

1. Pre-change snapshot captured by TITAN (auto-rollback available).
2. Execute fix command:
   Enforce MFA on user titan-live-20260421t224916z-svc-backup or rotate to SSO-backed identity. Audit last access date.
3. TITAN FORGE verifies the fix was applied.
4. Post-change rescan by TITAN SCOUT — finding must no longer appear.
5. Close ticket with Successful close_code.

RISK & IMPACT ANALYSIS

Risk level: MEDIUM risk — weaker control, should be hardened.
Business impact if unremediated: Control weakness that compounds with other gaps.
Scope: single resource (titan-live-20260421t224916z-svc-backup).
Blast radius: change is idempotent; pre-change snapshot captured by TITAN; auto-rollback available if rescan fails.
Finding detail: IAM user 'titan-live-20260421t224916z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

BACKOUT / ROLLBACK PLAN

1. TITAN auto-captured snapshot of titan-live-20260421t224916z-svc-backup before change (baseline: titan-3cloud-20260421T224916Z).
2. If post-change rescan still shows the finding OR a new issue appears within 15 min:
   a. TITAN FORGE fires rollback automatically using stored snapshot.
   b. Incident reopens and escalates to on-call.
3. Manual rollback command path (human override) is documented in close notes.

TEST PLAN

1. TITAN SCOUT rescans titan-live-20260421t224916z-svc-backup immediately after FORGE applies the change.
2. PASS criteria: the specific finding no longer appears in SCOUT results.
3. PASS criteria: no new CRITICAL or HIGH findings introduced by the change.
4. Automated compliance check: HIPAA/PCI/SOC2 controls re-evaluated.
5. If any check fails, backout plan fires automatically.

RECOMMENDED FIX COMMAND

Enforce MFA on user titan-live-20260421t224916z-svc-backup or rotate to SSO-backed identity. Audit last access date.
ATTACHED SERVICENOW INCIDENT
SEC-9203 — [TITAN] Medium — security on titan-live-20260421t224916z-svc-backup
Priority: Medium INCIDENT AWS
IAM user 'titan-live-20260421t224916z-svc-backup' has no MFA enabled. Privileged operation account vulnerable to credential compromise. CIS_AWS_1.14.

Recommended Fix:
  Enforce MFA on user titan-live-20260421t224916z-svc-backup or rotate to SSO-backed identity. Audit last access date.

Rollback:
  TITAN pre-change snapshot captured automatically.

Compliance:
  CIS 1.x IAM, NIST AC-2, SOC 2 CC6.1

AI CLOSE NOTES

2026-04-21 15:53:44 - System Administrator (Work notes)
[TITAN CONDUIT] Incident auto-filed from security scan.
Detecting agent: unknown (scan titan-3cloud-20260421T224916Z).
Severity: Medium (priority 3).
This is a hygiene/access-control issue that does not require a formal approval window. Assign to the listed team and resolve per their standard runbook. TITAN will auto-detect clearance on the next scan.

DOWNLOAD FULL REPORT: ⬇ HTML ⬇ PDF ⬇ DOCX

Want to see this against YOUR alert stack?

We point CONDUIT at your dev instance and run the same 3-cloud flow live in a 30-minute call. You keep the tickets + the teardown evidence.

Book the 30-min demo Back to CONDUIT