SCA Overview
The Security section covers security settings, access control, secrets management, and protected resources. It is organized into the following sub-sections:
- SCA (Software Composition Analysis) β Overview, Projects
- SAST β SAST
- Container Scanning β Overview, Vulnerability Reports, Exposed Secrets
- Namespace Security β Configuration Audits, RBAC Assessments, Infrastructure Assessments
- Cluster Security β Compliance, Configuration Audits, RBAC Assessments, Infrastructure Assessments, Vulnerability Reports
- Compliance β Configuration Audits, RBAC Assessments, Infrastructure Assessments, Vulnerability Reports
The Software Composition Analysis portfolio dashboard (this page) shows portfolio-level vulnerability metrics and policy violations across all projects. Use it to track vulnerabilities, projects at risk, and policy compliance over time.
Key Metricsβ
Four KPI cards with trend lines summarize:
- Portfolio Vulnerabilities β Total vulnerability count for the portfolio.
- Projects at Risk β Number of projects that have active risk (e.g. vulnerabilities or policy violations).
- Vulnerable Components β Number of components (dependencies) with known vulnerabilities.
- Inherited Risk Score β Aggregate risk score derived from vulnerabilities and policy state.
At the top of the page you can select 30 Days, 60 Days, 90 Days, or 1 Year to scope all metrics and charts.
Portfolio Statisticsβ
A summary block shows current counts:
- Projects and Vulnerable Projects
- Components and Vulnerable Components
- Policy Violations β total, plus split by License, Operational, and Security
- Portfolio Vulnerabilities and Suppressed (suppressed findings)
Use this to see the overall posture at a glance.
Chartsβ
-
Portfolio Vulnerabilities β Stacked area chart of vulnerabilities over time by severity: Critical, High, Medium, Low, Unassigned. Legend shows current counts and percentages.
-
Policy Violations by State β Stacked area chart of violations by state: Fail, Warn, Info.
-
Policy Violations by Classification β Stacked area chart by type: Security, License, Operational.
-
Auditing Progress (Findings) β Trend of Audited vs Unaudited findings over the selected period.
-
Auditing Progress (Violations) β Trend of Audited vs Unaudited violations.
-
Projects β Stacked area chart of Non-Vulnerable vs Vulnerable projects over time (with total project count).
-
Components β Stacked area chart of Non-Vulnerable vs Vulnerable components over time (with total component count).
Charts use the same time range as the page filter and show a last-measurement timestamp.