2022 – Present

Designing a Unified Security Interaction Model at AWS Security Services

At cloud scale, fragmented security interfaces and inconsistent interaction models slow investigation, increase cognitive load, and allow complexity itself to become a source of risk.

This project focused on designing a unified security interaction model across AWS Security Hub, GuardDuty, Inspector, and Macie, enabling consistent triage, investigation, and reasoning about aggregated risk.

Security Hub launch at AWS re Inforce 2025 keynote
Security Hub launch at re:Inforce 2025 · Amy Herzog, CISO of AWS

My Role

I am a core member of the AWS Security Services UX team. I own the interaction models and pattern libraries that define how security findings and aggregated risk are represented and reasoned about across all AWS Security products.

The System Problem: Unifying 4 Security Services

Security customers rely on multiple AWS services to understand different dimensions of risk in their environment: GuardDuty surfaces active threats, Inspector identifies vulnerabilities, Security Hub CSPM highlights misconfigurations, and Macie detects sensitive data risks.

As findings scale, security teams are required to mentally connect all these signals to understand overall security risk: which critical resources are exposed, how issues relate, and where to take actions first. When each security finding is delivered through an independent console and fragmented interaction model, customers struggled to understand, prioritize, and act on risk across services.

Security Hub, as the new AWS unified cloud security service, is aggregating all these security findings into one console. It also needed to unify how risk is understood and remediated, as unifying data alone was insufficient without a shared interaction model.

Amazon Inspector interface
Amazon Inspector
AWS Security Hub CSPM interface
AWS Security Hub CSPM
Amazon GuardDuty interface
Amazon GuardDuty
Amazon Macie interface
Amazon Macie

Interaction Model as Infrastructure

In this context, the interaction model itself became infrastructure. Unifying security services required a shared way to represent findings, and multiply the impact with their relationships, so security teams could reason about risk consistently across various signals.

My work focused on establishing common structures, patterns, and behaviors that translate complex security data into actionable understanding at scale.

In practice, this often meant pushing back on feature requests from individual service teams when proposed experience would break shared interaction patterns. I prioritized preserving a consistent investigation model across services, even when it required slower alignment and cross-team negotiation.

Designing the Finding Experience and Pattern Libraries

The finding experience is the core part of the unified interaction model user experience. Findings are the primary unit through which security teams triage risk, investigate issues, and decide next actions, yet each security service historically defined them differently.

User research revealed distinct needs across roles. Security analysts prioritized speed, density, and the ability to pivot quickly across related findings during investigation, while CISOs focused on high-level exposure, trends, and overall security posture.

These insights directly shaped how information was structured across the experience, from the finding header and findings table for rapid triage, to dashboards split between executive overview and analyst triage views.

I focused on standardizing how findings are structured and represented by defining a set of reusable interaction patterns, anchored by the finding detail panel. The finding detail was intentionally designed as a side panel rather than a modal or full-page view. For security analysts, investigation usually requires high information density, and involves rapid context switching across multiple findings. Keeping the primary list visible allowed analysts to preserve context awareness while drilling into details.

This pattern established consistent structure for context: overview, severity, status, evidence, impacted resources, and recommended remediation actions, enabling users to reason about findings without relearning each source. The pattern was shaped through 10+ user studies and multiple rounds of design iterations over 2 years, first launched in Security Hub CSPM and designed to scale across GuardDuty, Inspector, and Macie as a shared foundation.

Compliance finding detail example
Finding details example (Compliance finding)
Vulnerability finding detail example
Finding details example (Vulnerability finding)
Additional finding type variations
More types

The same model was extended to resource detail panels, and aggregated finding views, so that users could pivot from a finding to an impacted resource in a coherent workflow, without encountering a different interaction logic.

To support scale and consistency, I built “mini design systems” — patterns that were formalized into a couple of Security-focused pattern libraries built on top of the AWS Cloudscape design system, including the Finding Detail library, Resource Detail library, Finding List library, Dashboard library, etc.

Resource detail example
Resource details example

Schema-Adaptive Design Framework

I initially designed the finding details pattern for four categories of findings (Vulnerability, Compliance, Threat, and Sensitive Data). As security finding types continued to scale, I realized that mapping each schema to bespoke UI quickly became unscalable.

To address this, I built a schema-adaptive design framework application using AI-assisted vibe-coding tools (VS Code, Cline, Figma MCP) to translate OCSF-aligned schemas into consistent UI patterns, automatically mapping data structures to hierarchy, grouping, and emphasis, treating schema-to-interaction mapping as a first-class design challenge.

This approach significantly simplified handoff with frontend engineers by enabling teams to generate UI directly from new schemas, reducing repetitive UX work and removing the need for bespoke new design. It also allowed faster exploration of pattern consistency and testing of edge cases across services.

Schema adaptive UI generation app
Vibe coded schema adaptive UI generation app

The Aggregated Findings

Beyond individual findings, Security Hub helps security users understand how a primary resource or environment is exposed with Exposures, correlating groups of related findings (misconfigurations, vulnerabilities, threat, and sensitive data). My focus was on shaping how this exposure model is understood and used through interaction, specifically, how traits (e.g., reachability, vulnerability, assumability, etc.), contributing signals, and potential attack paths are surfaced together to support effective risk reasoning.

Building on the same vibe coding prototyping approach (along with an internal graph visualization library), I shaped the “potential attack path”, defining how impacted resources are connected, how users pivot into resource details, and how severity, traits, and contributing signals are surfaced to support more effective investigation.

Exposure details example
Exposure details example
Exposure details example traits
Exposure details example (traits)
Exposure details full screen example
Exposure details example (full screen mode)

In parallel, I helped clarify how the aggregated finding model relates to Amazon GuardDuty's attack sequence findings. While both aggregate multiple signals, attack sequences represent correlated threat behavior (network, runtime events, API activity, etc.) observed over time, gaining confidence of a true positive attack.

Unlike exposure, which aggregates conditions into a spatial view of relationships, attack sequences surface events in a linear timeline that emphasizes how correlated behaviors unfold. Making this distinction explicit ensured that threat timelines and exposure attack path each support different investigation needs without conflating interaction semantics.

Attack sequence details example
Attack sequence details example
Attack sequence full screen example
Attack sequence details example (full screen mode)

Outcome: Standardization Through Interaction Patterns

To scale across services and teams, these interaction models were reinforced through standardized patterns rather than one-off designs. At the pattern level, I helped define the console interaction and information architecture structures (e.g., finding/exposure/resource detail panel), while components and atoms provided reusable building blocks such as containers, graphs, and other component clusters.

In-console surveys collected showed an 89% preference for the new finding interaction pattern for its usability, simplicity, and functionality. This pattern–component–atom structure ensured that new capabilities could be added without redefining how users reason about security risk, enabling the interaction pattern to generalize across security providers and platforms.

Pattern component atom structure diagram
The Pattern-Component-Atom structure

A key example is the entity pivoting pattern: users move from a summary page to a findings list, into finding details, and further into impacted resource detail panels. The underlying interaction model remains consistent across findings, exposures, and resources, allowing security teams to investigate risk without cognitive reset.

Entity pivoting pattern diagram
Entity pivoting pattern

The interaction pattern also proved adaptable with business impact. Building on the same foundation, teams were able to introduce new capabilities, such as ticket creation integrations, MITRE ATT&CK tactic mapping, and finding history, without reworking the interaction model. These additions fit naturally into the existing finding structure as Security Hub evolved. In many cases, service engineering teams could apply these patterns directly without requiring bespoke, pixel-perfect design specifications.

This unified interaction was showcased as a five-minute Security Hub demo at AWS re:Inforce 2025 opening keynote, illustrating how AWS envisions security teams reasoning about aggregated risk across services through a single-pane-of-glass coherent system.

Security Hub exposure announcement slide and product interface
Amy Herzog introducing Security Hub Exposure
re Inforce 2025 demo dashboard
re:Inforce 2025 Demo: Dashboard
re Inforce 2025 demo potential attack path
re:Inforce 2025 Demo: Potential attack path
re Inforce 2025 demo finding details
re:Inforce 2025 Demo: Finding details