[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-22。"],[],[],null,["# Issues overview\n\n| Enterprise [service tier](/security-command-center/docs/service-tiers)\n\n*Issues* are the most important security risks Security Command Center\nEnterprise has found in your cloud environments. They're available in the\n**Risk** section of the Security Operations console, giving you the opportunity to\nrespond quickly to vulnerabilities and threats.\n\nIssues are discovered through virtual red teaming and\nrule-based *detections* . For example, a detection with the name\n**High Risk CVE on GCE with direct access to a high value resource** covers the\nfollowing situation:\n\n- A high risk, common vulnerability or exposure (CVE) has been found on a Compute Engine VM in your cloud environment.\n- That compromised VM has access to a [high value resource](/security-command-center/docs/attack-exposure-define-high-value-resource-set) through a service account.\n\nA detection can discover multiple instances of an issue.\nBy default in the Security Operations console, issues with the same\nseverity and detection are grouped together.\n\nIssue sources\n-------------\n\nIssues are classified as medium, high, or critical severity,\nand come from the following sources:\n\n- [Toxic combinations and chokepoints](/security-command-center/docs/toxic-combinations-overview)\n- [Predefined security graph rules](/security-command-center/docs/predefined-security-graph-rules)\n\nThe security graph is a graph database that has cloud resources like assets,\nidentities, apps, and data assigned to its nodes, while the edges of the graph\ndetermine the risk relationship between those resources following detection\nrules. When a relationship risk is discovered, security graph generates\nan issue.\n\nIssue lifecycle\n---------------\n\nIssues remain active until they are resolved. They can be\nresolved by fixing the findings referenced in the issues, or by\ndeleting the affected resources.\n\nInactive issues have a retention period of 90 days, after which they\nare deleted.\n\nWhat's next\n-----------\n\n[Manage and remediate issues](/security-command-center/docs/issues-manage-remediate)"]]