Security

Automated Remediation: Fix Compliance Gaps at the Speed of DevOps

September 26, 2025 TATER Security Team 10 min read

Compliance scanning is only half the equation. Identifying that a control is failing tells you what is wrong. Fixing it tells you what is right. Yet in most organizations, the gap between detection and remediation is measured in weeks, not minutes. Every day a failing control remains unremediated is a day of exposure, a day closer to audit, and a day of accumulated risk that compounds across the environment.

The Challenge: The Remediation Bottleneck

Internal benchmarking across enterprise environments reveals a striking contrast. Manual remediation of M365 compliance findings averages 38 days from detection to verified resolution. That timeline includes ticket creation, assignment, knowledge transfer, portal navigation, configuration change, verification, evidence collection, and status reporting. Each step introduces delay, and any step can stall the entire process.

38 days
average manual remediation time vs. 4 minutes automated (internal benchmark)

The problem is compounded by the breadth of M365 compliance. A single CIS Benchmark scan may reveal 40 or more failing controls spanning Exchange Online, SharePoint, Defender, Entra ID, Power BI, and Purview. Each service has its own admin portal, its own PowerShell module, and its own configuration syntax. A technician remediating Exchange findings may have no experience with Purview or Power BI, creating knowledge silos that further slow the process.

The Two-Runbook Architecture

Automated remediation for M365 requires navigating a significant technical constraint: Exchange Online cmdlets only run under PowerShell 5.1, while modern Graph API operations perform best under PowerShell 7.2. A single-runtime approach forces compromises. The two-runbook architecture eliminates those compromises entirely.

Remediation Pipeline Architecture TATER UI Webhook PS 7.2 Primary Graph API remediations EXO? No OK Yes PS 5.1 Companion EXO / Defender / S&C Status update via API

The primary runbook runs on PowerShell 7.2 and handles all Graph API-based remediations directly: Entra ID policies, Defender settings, SharePoint configurations, and Power BI tenant settings. When it encounters a script that requires Exchange Online cmdlets, it automatically detects the dependency by scanning the script content for EXO-specific patterns and delegates execution to the companion PS 5.1 runbook. The companion executes the EXO-dependent script, captures the result, and returns status to the primary runbook, which reports back to the platform.

Automation does not mean uncontrolled. Every remediation script is versioned, reviewed, and requires explicit user confirmation before execution. The speed comes from eliminating manual portal navigation, not from bypassing change control.

Coverage: 52 Scripts Across 7 Product Areas

Comprehensive remediation requires broad coverage. The current library includes 52 pre-built remediation scripts spanning the major M365 product areas:

Each script follows a consistent convention: accept parameters, execute the configuration change, verify the result, and return a structured response with success/failure status, a human-readable message, and technical details for audit logging.

52
pre-built remediation scripts covering 7 M365 product areas

Safety Model: Confirmation Before Execution

Speed must never come at the expense of safety. Automated remediation operates within a deliberate safety model:

Webhook Integration

For organizations with existing ITSM or change management workflows, webhook integration allows remediation events to trigger downstream processes. When a remediation is triggered, an HMAC-signed webhook payload is sent to the configured endpoint, enabling integration with ServiceNow, Jira, or custom orchestration systems. The webhook includes the control ID, script name, trigger user, and organization context.

How TATER Helps

TATER provides one-click remediation directly from the unified control detail view. When a control is failing and a remediation script exists, a remediation button appears on the control card. Clicking it opens a confirmation modal with parameter review, then triggers the two-runbook pipeline. The platform polls for status updates with visual progress indicators and reports success or failure with detailed results. The remediation catalog maps unified control IDs to legacy catalog entries via variation linkage, ensuring that remediations are correctly targeted regardless of how the control is referenced. Webhook integration, SIEM event forwarding, and full audit trail logging ensure that automated remediations are fully traceable and integrate with your existing change management processes.