diff --git a/docs/product_design_documentation.md b/docs/product_design_documentation.md
index 60679793..ffea5b81 100644
--- a/docs/product_design_documentation.md
+++ b/docs/product_design_documentation.md
@@ -2,38 +2,52 @@
## Vision
-**Heureka is a Security Posture Management tool designed to manage the security issues in a complex technology landscape.**
+**Heureka is a Security Posture Management tool designed to manage security issues in a cloud operating system.**
-Heureka is committed to empowering service owners with a central platform for proactive security management. It seamlessly integrates key components such as advanced patch management, intelligent SIEM analysis, and automated policy enforcement.
+Heureka is committed to empowering cloud operators with a central platform for _proactive_ and _automated_ **assessment** and **remediation** of security issues while easing **compliance** fulfillment.
+
+- **Issue Assessment** - automated identification, classification, and prioritization of security issues. Example: assigning a severity level based on a service's classification of high availability, integrity, or confidentiality.
+
+
+- **Remediation Tracking** — streamlined and automated tracking of all operations that address security issues. The current scope includes tracking security patches/updates to address known vulnerabilities; tracking services to ensure they are configured according to security standards; triaging detected threats and providing a means to respond to/address threats.
+
+
+- **Compliance Management** - Ensuring state change documentation and adherence to relevant security regulations and industry standards. e.g., PCI DSS,
+
+>>> _A Security Issue refers to any problem that can compromise confidentiality, integrity, and availability e.g.: Vulnerabilities; threats; exposures (due to misconfigurations)_
-It is also designed to address the critical compliance aspect as it is equipped with capabilities to track the end-to-end remediation process, thereby providing tangible compliance evidence. This approach to security posture management ensures a comprehensive and professional approach to maintaining robust security standards.
## Problem Statements
### Complexity and Visibility
-Maintaining security in a complex cloud operations platform landscape is a monumental task. These landscapes often consist of numerous services, each with a multitude of components like images, databases, libraries, and configurations.
-The challenge is compounded by the fact that these components have varying versions and can be shared across multiple services creating a critical need to pinpoint the specific instance (version) of a component as the security baseline, as vulnerabilities within a single component can impact multiple services within the landscape.
+Maintaining security in a cloud operations platform landscape is a monumental task. These landscapes often consist of numerous services, each comprising multiple components like images, databases, libraries, and configurations.
+The challenge is compounded by the fact that these components have varying versions and can be shared across multiple services, creating a critical need to pinpoint a component's specific instance (version) as the security baseline. Therefore, vulnerabilities of a single component can impact multiple services within the landscape.
+
+![image](https://github.com/cloudoperators/heureka/blob/main/docs/assets/Problem%20Statement%20-%20Complexity%20Visibility.png)
+
### Compliance and Efficiency
-Meeting compliance requirements and maintaining robust security standards is time-consuming and resource-intensive due to the lack of centralized visibility into the intricate relationships and dependencies between services and their underlying components as well as configurations.
+Meeting compliance requirements and maintaining robust security standards is time-consuming and resource-intensive due to the lack of centralized visibility into the intricate relationships and dependencies between services and their underlying components and configurations.
This makes tracking remediation, documenting evidence, and managing security configurations difficult leading to inefficient security operations and delayed remediation efforts.
+
+![image](https://github.com/cloudoperators/heureka/blob/main/docs/assets/Problem%20Statement%20-%20Compliance%20Efficiency.png)
+
## Business Goals
- Enhance Visibility and Security Posture:
- - Track the overall state of the technology landscape
- - Track security issues associated to specific components of the technology landscape
+ - Track the overall state of the cloud operating system
+ - Track security issues associated with specific components of the cloud operating system
- Streamline Security Operations:
- - Provide a central platform to monitor and assess the overall security posture of the technology landscape
- - Streamline the patch management process to close vulnerabilities and reduce attack surfaces.
- - Enforce consistent security configurations across all systems to minimize misconfigurations that could create security gaps.
- - Improve threat detection and response with Security Incident and Event Management (SIEM) Integration to aid threat detection and incident response.
+ - Provide a central platform to monitor and assess the overall security posture of the cloud operating system
+ - Streamline the remediation process to close vulnerabilities and reduce attack surfaces.
+ - Enforce consistent security configurations across all systems to minimize misconfigurations.
+ - Improve threat detection and response with Security Incident and Event Management (SIEM) Integration.
- Enhance Compliance, and Auditability:
- - Assists in meeting security compliance requirements by tracking remediation status/progress and providing evidence of adherence.
- - Document the remediation, classification, and impact of issues
- - Document the changes corresponding with Patching of Vulnerabilities, Updating components, threat detection alert remediations, and configuration updates.
+ - Assists in meeting security compliance requirements by tracking/documenting assessments, and remediation status/progress thereby providing evidence of adherence.
+ - Document all state changes resulting from the tracked remediation activities.
@@ -44,8 +58,8 @@ This makes tracking remediation, documenting evidence, and managing security con
| Support Group | A support group consists of multiple users working on a defined scope of services |
| Support Group Owner | Owners/ administrators of Support Group |
| Support Group Engineer | Individual users that are members of a support group |
-| Service | Services are the main entities used by Heureka to represent our in. A service consists of one or multiple components. With an owner and at least one delegate |
-| Component | A service consists of one or more components and is the basis for confirming a service is affected by an issue. There are different component types such as (Keppel)Image of Github Repository. |
+| Service | Services are the main entities in Heureka. A service consists of one or multiple components. With an owner and at least one delegate |
+| Component | A component is the baseline for confirming a service is affected by an issue. There are different component types such as (Keppel)Image of Github Repository. |
| Component Instance | A component that is an instance of a component |
| Component Version | A version of a specific component at a certain point in time |
| Package | Packages are a technical detail for Keppel Images. Keppel uses Clair as a vulnerability scanner and performs package indexing. This package list gives information about what is used in the Keppel Image. |
@@ -53,10 +67,10 @@ This makes tracking remediation, documenting evidence, and managing security con
| Issue Match | This is the association of a found weakness to the deficient resource (component instance). It therefore represents the issue to be fixed|
| Service Owner | A service owner is the responsible person for a service. They represent the service in an audit and are responsible for the fulfillment of security controls |
| Delegate | A person that is a delegate for the Service Owner |
-| Activity | The collects all remediation-related information and related changes for each issue match|
+| Activity | The collects all remediation-related information and associated changes for each issue match|
| Change | A change captures a change event in a specific component |
| Evidence | Evidence consists of all audit-relevant information. |
-| Target Remediation Timeline | Target Remediation Timeline - the timeline in which a specific issue match has to get remediated |
+| Target Remediation Timeline | The timeline in which a specific issue match has to get remediated |
| Remediation | A change that eliminates an issue match |
| Irrelevance Statement | A reasoned statement that a specific "Issue Match" is irrelevant for a component or set of components |
| Rollback | The rollback of a change for a component(s)/issue(s) combination |
@@ -64,76 +78,152 @@ This makes tracking remediation, documenting evidence, and managing security con
-## User Profiles
+## Personas
+
+### The Engineer/Operator
-### Auditor
-Responsible for validating the compliance of the platform to Industry Standards.
+The Engineer belongs to any of the teams responsible for maintaining the resources of a cloud operating system, such as individual applications, OpenStack services, etc.
+>Example Role: service owner, service support group engineer
- #### Goals
- * Validate if all requirements of industry standards are met or not.
+ * Keeping all services available and in pristine condition - no vulnerabilities, no suspicious activity unaddressed, no misconfiguration
+ * Monitors found issues, and ensure remediation timelines are met.
-- #### Tasks
+- #### Challenges
- * Review logs and historical remediation activities to verify that the process is followed
- * Review remediation activities; this includes, patching, Security Event Alert resolution, and policy violations
- * Review audit artifacts
+ * Manually tracking (and documenting) all components consumed by owned service for open issues can be time-consuming and error-prone.
+ * Manually tracking remediation timelines is challenging due to varying issue complexities.
-### Service Owner
+ - #### Needs
-The responsible person for a Service - manages a service’s complete lifecycle
+ * An automated tracking of all components consumed by owned service for open issues.
+ * A centralized and automated documentation system that tracks the management of remediation activities.
+
+
+### The Manager
+
+A management professional responsible for the overall well-being of security posture and overseeing the implementation and maintenance of security systems and protocols
+>Example Role: Team Manager, Manager of Managers
- #### Goals
- * Ensure availability and quality of a specific service and that remediation TRT are met
+ * Maintain a comprehensive overview of the organization's security posture.
+ * Ensure effective implementation and adherence to security protocols within the team.
+
+- #### Challenges
+
+ * The lack of a centralized security management system makes getting a holistic view of the organization's security posture difficult.
+ * Lack of visibility of the effect of specific issues on the cloud operating system.
+
+ - #### Needs
-- #### Tasks
+ * A centralized security and comprehensive view of the organization's security posture.
+ * Drill down on specific issues and fetch associating information such as the component/services impacted, the remediation efforts/status, and user affiliations.
- * Define what components are belonging to the service
- * Owns risk definitions
- * Owns service
- * Coordinate activities and participate in audit sessions as a service rep
- * Review vulnerability and patching activities
- * Handles security event alerts as well as policy violations
- * Review evidence
- * Monitor issue statuses
-### Support Group Engineer
-A group of experts dedicated to managing component instances and is responsible for performing actual issue-remediation activities
+### The Process Owner
+
+Any central security/compliance team member, responsible for the compliance-related processes within the cloud operating system. This includes the Patch Management process, the SIEM process, etc. This is usually a single person ensuring that all activities relating to a specific compliance process align with the security control guiding it toward meeting regulatory requirements.
+>Example Role: Patch Management Process Owner, SIEM Process Owner
+
- #### Goals
- * Seamless activity tracking
+ * Maintain the integrity of a compliance process
+ * Ensure the audit-relevant information required as evidence is correct, complete, and maintained.
+
+- #### Challenges
-- #### Tasks
+ * Ensuring all process stakeholders participate in their respective activities
+ * Difficulty in coordinating and managing multiple stakeholders
- * Plan activities
- * Monitor issue matches and issue match states
- * Perform manual patches, issue remediations, and respond to SIEM alerts.
+ - #### Needs
-### Process Facilitator
+ * A Centralised system that triages and categorizes all issues and provides relevant information such as type of issue, remediation timeline, remediation activities
+ * A centralized system to facilitate the coordination and management of multiple stakeholders.
-Responsible for ensuring that all established processes are followed including the patch management process and the Security Information & Event Management (SIEM) process
+
+### The Third Party Integrator
+
+An engineer responsible for the technical implementation of security measures. They triage existing security elements via the Heureka plugin and ensure its seamless integration into the cloud operating system.
+>Example Role: A Security Engineer
- #### Goals
- * Overview of activities
- * Detect deficiencies timely
+ * Efficiently integrate and enable the Heureka plugin in the organization's technology landscape.
+ * Continuously monitor and optimize the performance of the Heureka plugin.
+
+- #### Challenges
-- #### Tasks
+ * Streamlining various security processes and tooling can be complex and time-consuming.
- * Perform monthly self- assessment
- * Ensure that the audit-relevant information required as evidence is correct, complete, and maintained.
+ - #### Needs
+
+ * A comprehensive understanding of the Heureka plugin and its technical requirements for efficient integration.
+ * To be able to validate the proper configuration of Heureka
+
+
+
+### The Auditor
+A representative of a specific business unit, responsible for confirming the integrity of the security posture management system in terms of compliance. This individual is particularly interested in audit artifacts and plays a crucial role in maintaining the organization's adherence to regulatory standards.
+>Example Role: A Business Unit Auditor
+
+- #### Goals
+
+ * Ensures adherence to remediation timelines.
+ * Ensures remediation activities are carried out
+ * Maintain and review audit trails and artifacts to ensure all processes are compliant.
+
+- #### Challenges
+
+ * The absence of a centralized tooling system makes it difficult to monitor compliance across different services
+ * Ensuring consistent compliance across all teams of the LOB
+
+ - #### Needs
+
+ * A centralized view providing a comprehensive view of compliance across different services.
+ * Clear communication channels for collaboration and information sharing within the business unit.
## High-Level Features
-**TBD**
+### Security Issue Overview
+
+This provides a comprehensive and interactive overview of all security issues in the cloud operating system including real-time data on vulnerabilities, policy violations, and active threats.
+It allows for easy navigation and drill-down into specific issues for detailed information facilitating prompt and effective response.
+Powered by scanner engines gathering new issues from established repositories. It includes:
+
+- CVE Scanners: Collects data from CVE advisories, providing up-to-date information on potential system vulnerabilities.
+- Policy Violations Scanners: Interacts with the Policy Gatekeeper tool to identify actions that violate predefined security policies.
+- SIEM Alerts Scanners: Interfaces with a SIEM system, triaging alerts of security threats and potential breaches.
+
+
+### Inventory Overview
+This provides a comprehensive view of all components within the cloud operating system from a Service point of view.
+It provides detailed information about existing component instances and versions of a service along with the owning team.
+This helps assess the impact of security issues, plan for improvements, and ensure oversight of the cloud operating system's security posture.
+
+### Issue Classification/Documentation
+This feature ensures a systematic and compliant classification of all security issues. It involves documenting essential attributes such as a unique ID (e.g., CVE ID), severity level, target remediation time, and affected service resolution efforts.
+This comprehensive documentation aids in prioritizing and managing security issues effectively.
+
+### Issue Remediation Management
+This feature empowers cloud operators to track each issue's lifecycle, providing complete visibility from identification to remediation. It enables more efficient issue management and resolution, enhancing overall security posture.
+
+### Compliance Artifact Management
+This feature simplifies fulfilling compliance requirements. by providing real-time, comprehensive audit artifacts and evidence. It ensures that all necessary compliance documentation is readily available and up-to-date, making audits smoother and more efficient.
+
+### Alerting and Notifications
+This feature would provide real-time alerts and notifications about new and emerging security issues. This could include email notifications, SMS alerts, or integration with communication platforms like Slack. This would ensure that teams are immediately aware of any issues and can respond promptly.
+
+## High-Level Architecture
+![image](https://github.com/cloudoperators/heureka/blob/main/docs/assets/Heureka%20High-Level%20Architecture.png)