loader image

Prisma
Cloud

Cloud secures hybrid
& multi-cloud environments

Role: UX & UI design

Intro

Cloud computing security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructures of cloud computing.

In this project, I focused on creating a flow for a monitoring system that identifies security weaknesses and protects if needed

The Challenge

Unprotected systems in a multi

cloud environments

Security and DevOps teams are facing the challenge of monitoring unprotected systems while building and deploying in multi environments

The Goal

complete security across the development lifecycle on any cloud

Research

What challenges face
security developers?

  • A
    A growing number of entities to secure
  • B
    Changing environments
  • C
    Protection and compliance of the entire system lifecycle
  • D
    Fast-paced work

The User

Shilla, 38, DevOps developer,
uses Prisma Cloud software on
a daily basis constantly monitors services, identifies and protects security vulnerabilities

Proper utilization of services is
an integral measure of a product’s success

Interviews

User’s pain points

  • A
    Multiple categories, items, and information
  • B
    Orientation challenge in the relevant information screens
  • C
    Challenge in managing parallel systems of alerts and report summaries
  • D
    It is difficult to identify a critical issue

Market Research

Insights

How can the workflow of
a developer be improved?

  • Creating an
    up-to-date,
    flexible
    workspace

  • Unprotected
    systems must
    be located
    quickly

  • Continual alerts
    for all cloud
    environments

Concluding Remarks

  • Unprotected systems will appear first by default

  • Systems that are partially protected will appear as “unprotected,” and the protection level as a percentage

  • Items and failed systems will be reported even in parallel environments

  • Multiple choices will be offered for unprotected systems and collective protection

  • Support communication between developers working on the same dashboard

  • Transparency and central feed in all categories to enhance control and orientation

  • A central search bar by name, date, urgency, etc., along with options for sorting and filtering for accurate results

  • Easily change workspaces manually by creating a flexible workspace

User Flow

  • Step 1

    Product main navigation has 5 sections:
    Radar | Defend | Monitor | Manage | Segment

  • Step 2

    Focus on the Monitor section, which has these categories:
    Events | Runtime | Vulnerabilities | Compliance 

  • Step 3

    Focus on the Compliance category

  • Step 4

    The compliance category has 7 subcategories:
    Compliance Explorer | Containers | Images | Hosts | Functions

    | Trusted Images | Cloud Discovery | Cloud Compliance

  • Step 5

    Focus on the last one: Cloud Discovery. Under this subcategory we will have 3 different cloud providers:
    AWS | Azure | GCP 

  • Step 6

    Focus on the first one: AWS

  • Step 7

    Select an account in which we want to review its status:
    protected / unprotected 

    (There are usually many accounts to choose from between 1-100 for example)

  • Step 8

    After selecting an account, we will show 4 types of apps under the AWS cloud:
    ECR | Lambda | ECS | EKS 

  • Step 9

    Each one of these types of AWS cloud will show:
    The number of total items | List of the items | Status of these items: protected/unprotected 

Wireframes

Design

  • The dashboard menus and submenus are visible
  • A tile view displaying faulty systems at the top
  • Parallel to search results, access and view the system
  • The system focus provides immediate assistance in handling the system
  • A permanent split-screen for instant system access
  • Display tables to maximize space