Back to Designs page

Table of Contents

Related Research

No research entries have been linked to this design.

Resources

No resources available for this entry.

Additional tags

No tags are assigned to this entry.

Default vulnerability filters

Zhenpeng Chen avatar

Author: Zhenpeng Chen | Last edit: January 31, 2024 | Design type: Filtering | Product area: ACS

Default vulnerability filters

The default vulnerability filters allow users to select and set the respective value on the “CVE severity” and “CVE status” filter categories.

Suppose any of the filter category's values are selected to be filtered. In that case, the table list in Workload CVEs will only show the respective data based on the selected value of that category from the default vulnerability filters.

All of the selected values of filter categories will also be shown and updated on the filter toolbar below. 

If users intend to click the button "Clear filters', it will clear all of the selected criteria that are shown under the filter toolbar and update the data in the table but still preserve the selected value of the filter categories inside the default vulnerability filters. 

Question: Why are we preserving the selected value of the filter categories inside the default vulnerability filters?

Answer: We are expecting the default vulnerability filters to be applied across 3 kinds of CVEs including “Workload CVEs”, “Platform CVEs” and “Node CVEs” which not only reduce the redundant step of readjusting the filter but also ensure the data provided are always based on the selected value of the filter categories from the default filter across 3 kinds of CVEs mentioned above. If users intend to modify some of the filter categories and values for 1 of the kinds of CVEs, the filter toolbar is always available and serves as a temporarily advanced filter that won't affect the preserved value in the default vulnerability filters if users jump to other kinds of CVEs' pages.

As of Dec 5, 2023, “Platform CVEs” and “Node CVEs” have not been released yet.