This page describes the Cloud Security metrics that are available for your deployments. You can monitor deployments across your configured cloud infrastructure for vulnerabilities and configuration issues.

Navigate Deployments 

On the Deployments page, you can view these security metrics: 

  • Security risk 

  • Name 

  • Misconfigurations found. These results appear as Yes or No statements. 

  • Active vulnerabilities 

Filter Pods 

You can filter your pods using the Search field, by Time range, Security risk, or through Group by filters.

To filter pods by security risk levels: 

  1. Navigate to Deployments
  2. Click the Security risk drop-down menu. 
  3. Choose one of the security risk levels: Critical, High, Medium, Low

Security Details for Pods 

When you click on a specific pod, you can view these security details:

  • Security risk levels: Critical, High, Medium, Low
  • Name of the pod. 
  • If there are misconfigurations found:
    • Has privileged access

    • Can run as root
    • Has a host path mounted with write privileges
    • May have risky capabilities allowed
    • Node PIDs maybe shared with this workload
    • Public facing
    • Has a risky role
  • Attributes:
    • Node
    • Cluster
    • Workload
  • Active containers 

Overview UI Screenshot