JFrog Xray - Security policies
- Policies in JFrog Xray are sets of rules
- Each rule defines specific license or security criteria
- Corresponding actions are triggered automatically based
on these criteria
Product design
UX research
User interface
The goal
- Simplify the current process for users
- Make the interface more convenient
Importance of JFrog Policy creation
Crucial for safeguarding developers' software against software supply chain attacks.
The mission
Improve the user experience for the Policies screens, including creating new policies and editing existing ones.
The solution
- Replace the long and busy popup form with a single screen with three easy steps
- Utilize the full screen width
My role
Conducted competitive analysis of platforms to evaluate their solutions for various steps in opening and editing new policies. Proposed a new organization and design for the user process.
Kick-off meeting
- Platform's purpose
- User flow
- Market competitors
- Users
Research
- User interviews
- Product manager interview
Task analysis
Analyze tasks and user
interactions to identify
pain points and improvements
Information architecture
Structure and organize platform
content for easy navigation
Use case
Low & High
fid design
fid design
Kick-off meeting
- JFrog Policy creation
Crucial for safeguarding developers' software against software supply chain attacks - User flow
- Market competitors
AWS, Microsoft Azure, Datadog, Github Enterprise, Gitlab - Users
DevOps developers & CISO
Research
50%
of data breaches are caused by a third-party service
65%
of organizations “rely heavily” on third parties
20%
those organizations allocate less than 20% of their internal resources for assessing third-party risk
$7.5 Million
is the average cost of third-party data breach