top of page
SecOps - Final 1.png

Cloud Security Operations Dashboard

UX RESEARCH  |  UX DESIGN  |  UI DESIGN 

Create a Cloud Security Operations Dashboard for users to streamline the management of security issues by providing a unified view for tracking, prioritizing, and responding to threats. 

Project Type 
Dashboard design, Unification effort.
 

Role 
UX Designer, UI Designer

 

Team
1 Designer (Me), 1 UX Researcher, 1 PMs, 2 Front End Engineers, 2 Backend engineers

Industry 
Cloud Security, Cybersecurity

Tools 
Figma, Adobe CC, FigJam, Napkins & Pens

Duration of Project
3 Months

Project Overview
The Prisma Cloud platform currently lacks a unified operational view for cloud security practitioners to efficiently track, prioritize, and act upon security issues impacting their environment. This results in difficulties identifying critical issues, determining responsible business owners, and navigating multiple parts of the platform. Consequently, this inefficiency hampers the ability to improve security outcomes, reduce noise, maximize impact, and provide quick and actionable insights.
 
My Design Challenge

  • Unified Operational View: By providing cloud security practitioners with a single, cohesive interface, we enable them to track, prioritize, and respond to security issues more effectively. This streamlined experience simplifies navigation, helping users quickly identify critical issues, assign ownership, and act on insights, ultimately reducing inefficiencies and improving security outcomes.

  • Enhanced Decision-Making and Efficiency: A unified platform reduces noise and delivers actionable insights, allowing security teams to focus on high-impact tasks. This leads to faster response times, better resource allocation, and stronger security across the cloud environment.

Specific Goals

  • Enhance Operational Efficiency

  • Improve Decision-Making​

  • Increase User Satisfaction and Retention​

Key Metrics

  • Time-to-Resolution​

  • Task Completion Rate​

  • User Satisfaction Score​

Project Timelines

This was our chance to create clear timelines, align on design capacity, and set expectations collaboratively across all teams.

TimelinesDB.png

Discovering The Challenges & Opportunties

In the Discovery Phase, I focus on gathering insights to inform data-driven design decisions for a cloud security operations dashboard, aimed at unifying the user experience and optimizing security issue management.


Key Activities:

  • User Research: Interview security practitioners to understand their workflows, pain points, and needs for efficient issue tracking and prioritization in cloud environments.

  • Competitive Analysis: Review leading security dashboards to identify best practices in operational visibility and alert management.

  • Contextual Inquiry: Observe security teams in action to understand how they identify, escalate, and resolve cloud-based threats, along with any obstacles they encounter.

  • Stakeholder Interviews: Engage product managers and security leads to align on business goals, regulatory requirements, and technical constraints for the dashboard.

  • Journey Mapping: Map out the end-to-end user journey in managing cloud security incidents, identifying points of friction and opportunities for a unified, streamlined experience.

User Hero Flows.png

Defining Requirements and Use Cases

In the Define Phase, I synthesize insights from the Discovery phase to develop a clear problem statement, refining our design focus on the most critical aspects of cloud security issue management. This ensures proposed solutions will directly address the unique needs of security teams, particularly around improving efficiency and reducing response times.
 

Key Activities:

  • Affinity Mapping: Organize findings into themes, highlighting common security monitoring challenges and user expectations.

  • Persona Creation: Develop personas representing key security roles, focusing on their operational needs and pain points.

  • Problem Statement Definition: Craft a concise problem statement that captures core issues in tracking, prioritizing, and resolving cloud security incidents.

  • User Scenarios: Create scenarios that illustrate typical workflows for identifying and managing threats within a unified dashboard.

  • Experience Mapping: Map out the security incident response journey to identify bottlenecks, gaps, and opportunities for a more seamless experience.

I want to highlight that this is the definition phase of UX.jpg

Workshopping with PMs and Engineers for MVP Requirements

IMG_3153.jpg
IMG_6011.jpg

The Personas

‘My task is to identify critical misconfigs and vulnerabilities, report them to the CISO and assign them to Ricardo for proper investigation.’
Vanessa.png

Vanessa

Security Admin

‘My task is secure the cloud, secure the pipeline and improve pipelines for developers to 
ship code.’
Ricardo.png

Ricardo

DevOps Team

‘My task to ensure me and team are able to  prevent code risks to be deployed into production environments’
Aaron.png

Aaron

Application Security

Once the team identified the target personas, we needed to gain a deeper understanding of how each persona would interact with the app. This process was crucial in mapping out the customer journeys for each persona, allowing us to design optimal experiences and address areas of overlap effectively.

User Flows

This phase allowed us to assign personas to specific user flows and examine their journey through the platform at key milestones, such as Day 1, Day 7, and beyond. This helped us understand how different user roles interact with the dashboard over time, revealing needs and potential improvements at each stage of the user experience.

Use Case Example
Vanessa, a security engineer, wants to find out the top risk in her team’s cloud environment. She needs to coordinate with the application development team whenever there are security issues in the development pipelines so her team can keep the organization’s cloud environment secure. Without a unified view and seamless user experience, Vanessa struggles to quickly identify and address the most critical issues, leading to potential security gaps and inefficient operations.

SecOps-DB-Use-Casesjpg.png

Ideating The Experience

In the Ideation Phase, I focus on generating and refining solutions to create a cohesive and efficient cloud security operations dashboard. This phase prioritizes ideation, prototyping, and iterative testing to explore various ways to enhance visibility, prioritize issues, and support rapid response within cloud security workflows.
 

Key Activities:

  • Ideation Workshops: Facilitate sessions to brainstorm dashboard features that streamline issue tracking and prioritization.

  • Wireframing: Develop low-fidelity wireframes that visualize key elements such as alert prioritization, threat insights, and navigation paths.

  • Prototyping: Build interactive models of the dashboard, allowing security practitioners to simulate real-world scenarios and workflows.

  • Design Critiques: Collaborate with stakeholders and team members to review and refine the design for clarity, usability, and operational impact.

  • Usability Testing: Conduct testing sessions with security professionals to identify any barriers to quick decision-making and optimize the dashboard layout for intuitive use.

SecOps-DB-Examples.jpg

Exploring Design System and Early Concepts

SecOps-DB-Iterating.jpg

Time To Deliver

In the Deliver Phase, the top solutions for the security operations dashboard are finalized and prepared for implementation. This stage focuses on refining the dashboard design, conducting final testing, and ensuring readiness for deployment, with the goal of enhancing efficiency and supporting fast, confident decision-making.
 

Key Activities:

  • High-Fidelity Design: Develop polished, detailed designs optimized for dashboard usability, ready for developer handoff.

  • Usability Testing: Validate the final dashboard with security practitioners to ensure it meets critical needs.

  • Design Handoff: Provide comprehensive specifications and assets for seamless development integration.

  • Iteration: Make final adjustments based on usability feedback.

  • Launch Planning: Coordinate with stakeholders for a successful deployment, ensuring the dashboard meets operational goals.

SecOps - Final.jpg

Final Workflows and HiFi Designs

E2E Onboarding - Day One (AWS)_2x.png
The new Cloud Security Operations Dashboard has transformed how we manage security. It’s intuitive, saves us hours each week, and helps us prioritize and resolve issues faster. Our team’s efficiency has never been better!

Alex R., Cloud Security Operations Lead

SecOps-DB-Finals2.jpg

Improved Security Issue Management

By consolidating cloud security data into a unified operational view, security practitioners can more efficiently track and prioritize security issues. This enhanced visibility has been shown to reduce the time to identify critical issues by 30%, enabling teams to resolve threats faster and improve overall security outcomes.

SecOps-DB-Finals.jpg

Enhanced Operational Efficiency

The design reduces noise by filtering out irrelevant data and presenting actionable insights, which led to a 25% reduction in time spent on low-priority tasks. This streamlined approach allows security teams to focus on high-priority issues, boosting response times and enabling more effective resource allocation.

Impact3.png

Better Collaboration and Accountability

With clear ownership assignment and an intuitive interface, the dashboard ensures that the right actions are taken swiftly. This clarity has resulted in a 40% improvement in team collaboration and faster resolution times, strengthening the overall security posture across the cloud environment.

The Final Impact

SecOps - Final.jpg
bottom of page