Portfolio Dashboard
Control & DirectionThe Portfolio Dashboard is the consolidated view of your security technology investments. It synthesizes data from the Technology Register, Capability Library, and Risk Coverage into visual summaries that help you answer strategic questions: Where are we well-covered? Where do we have redundant spend? Where are the gaps?
The Portfolio Dashboard draws data from the Technology Register, Capability Library, and Risk Coverage. Coverage data can be aligned to the NIST CSF reference framework.
Navigating to the dashboard
Open Stack & Coverage > Portfolio Dashboard from the sidebar. The dashboard loads with real-time data from your technology register and coverage assessments. All charts and summaries update automatically as you add technologies, link capabilities, or assess risk scenarios.
Domain heatmap
The domain heatmap is a radar chart that plots coverage strength across all ten capability domains: Identity, Endpoint, Cloud, Network, Data, AppSec, Detection, Response, Governance, and Other. Each axis represents a domain, and the filled area shows the aggregate coverage level based on the technologies and capabilities you have linked.
Domains with strong coverage extend toward the outer ring, while domains with weak or missing coverage collapse toward the center. This gives you an immediate visual indicator of portfolio balance. A lopsided heatmap suggests over-investment in some areas and under-investment in others.
Coverage summary
Below the heatmap, the coverage summary provides a tabular breakdown of each domain showing the number of technologies assigned, the number of capabilities covered, and the overall coverage strength. Use this table to drill into specific domains and understand exactly which tools contribute to coverage.
Overlap detection
The dashboard identifies overlap pairs where two or more technologies provide the same capability at the same strength level. Overlap is not inherently bad (defense in depth often requires redundancy), but it highlights areas where you may be paying for duplicate functionality. Each overlap pair lists the technologies involved and the shared capability, so you can make informed decisions about consolidation or intentional redundancy.
Gap signals
Gap signals surface capabilities and domains where no technology is assigned or where coverage strength is assessed as Weak or Not Assessed. These are the blind spots in your security program. Each gap signal includes the affected capability, the domain it belongs to, and a link to the Capability Library where you can investigate further or assign a technology.
NIST CSF reference overlay
Toggle the NIST CSF reference overlay to align the dashboard view with the NIST Cybersecurity Framework. When enabled, capabilities are grouped under the CSF functions (Identify, Protect, Detect, Respond, Recover), and the heatmap redraws using the CSF taxonomy. This is useful for board reporting, regulatory discussions, and benchmarking your portfolio against an industry-recognized standard.
AppSec extended metrics
The dashboard includes an AppSec extended metrics panel that provides deeper visibility into application security tooling. This panel surfaces metrics such as the number of AppSec tools in the portfolio, their coverage across the software development lifecycle, and any failing production security gates. Use this section to assess whether your AppSec investments are keeping pace with development velocity.
Failing production security gates
A dedicated section highlights failing production security gates detected across your AppSec tooling. These are active security checks in your CI/CD pipelines or production environments that are currently in a failed state. Each entry shows the gate name, the associated technology, and the failure context, helping you prioritize remediation of production-impacting security issues.
Recent audit trail
The bottom of the dashboard displays a recent audit trail showing the latest changes to the portfolio. This includes technology additions, capability linkage updates, coverage assessment changes, and status transitions. The audit trail provides accountability and helps you track who changed what and when.
Permissions
Viewing the Portfolio Dashboard requires the securityPortfolio:read permission. The dashboard is read-only; changes to the underlying data are made through the Technology Register, Capability Library, and Risk Coverage pages.