Evaluating Security Risks
Alauda Security Service assesses and ranks deployments by security risk, highlighting workloads that need attention because of policy violations, vulnerabilities, configuration issues, or suspicious runtime activity.
Risk View
The Risk view lists deployments and ranks them by risk priority. In the current UI, the default table includes the following columns:
- Name
- Created
- Cluster
- Namespace
- Priority
The page also includes the following controls:
- Show Orchestrator Components
- Default view
- Filter deployments
- Create policy
Use this page to identify the deployments that currently need the most attention, then drill into a deployment for more details. In populated environments, the default view shows a live ranked list of deployments for the selected scope.
Creating Policies from Risk View
You can create a security policy directly from the Risk view.
Steps
- Go to Risk in the portal.
- Apply filters to narrow the result set.
- Click Create policy.
- Define the policy details and save it.
Note: Risk-based policy creation uses the current filtered context. Scope-related filters such as cluster, namespace, deployment, and label are the most reliable inputs to carry into a generated policy.
Risk Details
Selecting a deployment opens a details area with deployment-specific risk information.
Typical information includes:
- Policy violations
- Suspicious process executions
- Image vulnerabilities
- Service configuration findings
- Service reachability
- RBAC-related risk
- Deployment metadata
- Process discovery details
- Event timeline, when runtime data is available
The exact sections shown depend on the selected deployment and the data currently available for it.