Jit- announcement icon

How can AppSec teams empower development orgs to deliver more secure code? We asked 150 developers.

Read the survey report

In this article

Introducing Workflows: Automate Security Alerting While Staying Focused on Real Risks

Charlie Klein - Director of Product Marketing at Jit
By Charlie Klein

Updated February 12, 2025.

Introducing Workflows: Automate Vulnerability Triage While Staying Focused on Real Risks

Security teams and developers are drowning in product security alerts. Every security scan generates a flood of issues, and manually reviewing, prioritizing, and assigning each one is time-consuming and inefficient. The result? Critical risks get buried in long backlogs, while developers waste time chasing issues that don’t actually introduce real risk.

That’s why we built Workflows—a simple UI that makes it easy to build automations that accelerate vulnerability triage based on contextual factors, like whether the vulnerability is “in production” or “internet-facing”.

With Workflows, our customers can ensure that the right security issues get to the right teams at the right time – but only if they introduce real risk. For this reason, critical risks never fall through the cracks and development teams aren’t overwhelmed with security issues.



Why We Built Workflows

Security teams need to ensure that vulnerabilities are identified and addressed before they become real threats. But today, they’re overwhelmed by sheer alert volume, forcing them into a tedious and time-consuming triage process.

Product security scans generate hundreds or thousands of issues, and AppSec teams are expected to manually sift through them to determine which ones actually matter. For every issue, they need to:

  1. Review the vulnerability – Is it exploitable? Does it impact production?

  2. Prioritize it – Is it critical enough to require immediate attention?

  3. Assign it – Which development team is responsible for fixing it?

  4. Communicate it – Open a Jira ticket or send a Slack message with relevant context.

This manual process creates three major problems:

  1. Alert overload and developer frustration – Some issues don’t pose real risk but still get assigned, wasting engineering time and causing friction between security and development teams.
  2. Critical issues fall through the cracks – Security teams are constantly playing catch-up, struggling to pinpoint critical vulnerabilities in all the noise.
  3. Manual triage bottlenecks – Every issue must be reviewed, prioritized, and routed manually, slowing down remediation.

The result? Critical risks can get lost in the backlog, and teams waste time on unnecessary triage work.

We built Workflows to automate security triage, ensuring that security teams stay focused on what matters most, without paying constant attention to the backlog. By setting clear, customizable conditions, teams can automatically route the right issues to the right people—without all the manual effort.

There are three core capabilities of the feature:

  • Auto triage - reduce manual effort by setting up automations that triage vulnerabilities via Jira or Slack

  • Conditional triage - to focus on the vulnerabilities that introduce real risk, like those that reside in a service deployed to production that is internet-facing

  • Team traceability - triage vulnerabilities to the team that owns the relevant service, so they can resolve the issue quickly

With Workflows, our customers can set up an automated system to triage the highest risks to the relevant team, and then watch Jit do all the heavy lifting.

How It Works

To create a Workflow, go to Settings (in the left menu) → WorkflowsCreate Workflow

From here, give the Workflow a name in the “Step Name” field – in this example, we’ll call it Critical Issue Exposed to Internet in Production.

Next, we’ll define how the workflow will be triggered.

a screenshot of a cell phone with the settings highlighted


A “Backlog finding” is simply a Jit-detected code or cloud security issue in Jit’s backlog. We’ll choose the “Backlog Finding Created” option, which indicates a newly introduced security issue.

Next, we’ll hit the + button in the diagram to create an action or a condition. Adding an action would triage the created security finding to Jira or Slack, while adding a condition would allow us to define a threshold for the issue before it is triaged. Let’s choose condition.

First we’ll select whether the condition is looking at the finding itself, or the resource where the finding resides. In this example, we’ll choose “Finding”. 

Now we’ll choose the factor to evaluate the condition – lets choose “Severity” and select “Critical” so that the workflow will only trigger alerts for security issues labeled as critical severity.

a screenshot of a computer screen showing a user interface


Other factors include:

  • Priority Factor - characteristics of a finding or resource that impact its security priority, like “In production”, “Internet-facing”, “Database Access”, and more.

  • Priority Score - a score based on Priority Factors. For example, findings that are “In production” have their score boosted by 20 pts. Their total score is the sum of all points derived from their priority factors.

  • Team - the relevant development team

  • Finding Type - such as code vulnerabilities, dependency vulnerabilities, container vulnerabilities, cloud infrastructure vulnerabilities, and more

  • CWE - the specific CWE code for the security issue

Back to the example…we don’t want to be overwhelmed with high volumes of alerts. So to narrow down the alerts to the security risks that really matter, let's create another condition that only triages the issue if it resides in a service in production that is internet-facing.

a screenshot of a computer screen with a text description


Lastly, we’ll create an action for this Workflow by hitting the + sign again in the diagram, which will automatically triage this issue via Jira or Slack. Let’s create a Jira ticket whenever this workflow is triggered. To do this, make sure the Jira integration is configured.

a screenshot of a flow chart with a question


Now, we can hit save and that's it! Whenever Jit detects a critical code or cloud security issue in a service that is in production and internet-facing, this workflow will automatically create a Jira ticket, which can be configured to send to the relevant team.

We can see whenever this Workflow was triggered by hitting the History button.

a screenshot of a set of buttons and numbers


And lastly, we can check out and edit all of our defined Workflows in the Workflows page.

a screenshot of the workflows screen


Workflows: Automate, Prioritize, and Reduce Risk

With Workflows, teams can eliminate manual triage, ensure critical issues are never lost, and keep developers focused on real security risks. By automatically filtering out noise and escalating only what truly matters, security teams save time, and developers can stay productive without unnecessary disruptions.

With automated and condition triage, Workflows help you stay secure while staying fast.

Want to see Workflows in action? Try Jit today or book a demo so we can show you how it could work in your environment. 🚀