Evaluating Security Risks

Alauda Security Service assesses and ranks deployments by security risk, highlighting workloads that need attention because of policy violations, vulnerabilities, configuration issues, or suspicious runtime activity.

Risk View

The Risk view lists deployments and ranks them by risk priority. In the current UI, the default table includes the following columns:

  • Name
  • Created
  • Cluster
  • Namespace
  • Priority

The page also includes the following controls:

  • Show Orchestrator Components
  • Default view
  • Filter deployments
  • Create policy

Use this page to identify the deployments that currently need the most attention, then drill into a deployment for more details. In populated environments, the default view shows a live ranked list of deployments for the selected scope.

Creating Policies from Risk View

You can create a security policy directly from the Risk view.

Steps

  1. Go to Risk in the portal.
  2. Apply filters to narrow the result set.
  3. Click Create policy.
  4. Define the policy details and save it.

Note: Risk-based policy creation uses the current filtered context. Scope-related filters such as cluster, namespace, deployment, and label are the most reliable inputs to carry into a generated policy.

Risk Details

Selecting a deployment opens a details area with deployment-specific risk information.

Typical information includes:

  • Policy violations
  • Suspicious process executions
  • Image vulnerabilities
  • Service configuration findings
  • Service reachability
  • RBAC-related risk
  • Deployment metadata
  • Process discovery details
  • Event timeline, when runtime data is available

The exact sections shown depend on the selected deployment and the data currently available for it.