Report: {{ recipe_name }} |
Generated: {{ generated_at }} |
{% if metadata and metadata.start_date and metadata.end_date %}
Period: {{ metadata.start_date }} to {{ metadata.end_date }} |
{% endif %}
Records: {{ metadata.transformed_count if metadata and metadata.transformed_count else 'N/A' }}
{% if chart_data %}
{% if chart_data.pareto_chart is mapping and chart_data.pareto_chart|length > 0 %}
🔢 Top Risk Components - Pareto Analysis
Components sorted by composite risk score with cumulative risk percentage. Shows which components contribute disproportionately to total risk.
{% endif %}
{% if chart_data.bubble_matrix is mapping and chart_data.bubble_matrix|length > 0 %}
🎯 Component Risk vs Project Scope
Bubble chart showing risk score vs number of affected projects. Bubble size represents finding count.
{% endif %}
{% else %}
No chart data available for visualization.
{% endif %}
Executive Summary
The Component Vulnerability Analysis provides a strategic portfolio-level view of the most problematic components across your entire organization. This report identifies which component versions pose the highest risk and have the broadest impact, enabling portfolio-wide component risk prioritization.
Key Insights from Visualizations
- Pareto Analysis: Shows which components contribute disproportionately to total risk, with each version treated uniquely for precise risk assessment.
- Risk vs. Scope: Identifies components with both high risk and broad project impact for maximum remediation efficiency.
- Normalized Risk Scoring: Risk scores are normalized by project count to provide fair comparison across components used in different numbers of projects.
Strategic Recommendations
- High-Risk Components: Focus immediate remediation efforts on components with the highest normalized risk scores.
- High-Impact Components: Prioritize components affecting multiple projects for maximum portfolio-wide risk reduction.
- KEV and Exploit Flags: Components with 🔒 (KEV) or 💥 (exploit) markers require immediate attention due to federal guidance and active threats.
- Portfolio Management: Use this report to inform strategic component selection and vendor partnerships.
{% if portfolio_table_data and portfolio_table_data.rows %}
Portfolio-Level Component Risk Data
| Component Name |
Version |
Projects Affected |
Portfolio Composite Risk |
Normalized Risk Score |
Findings Count |
Has KEV |
Has Exploits |
{% for row in portfolio_table_data.rows %}
| {{ row.name }} |
{{ row.version }} |
{{ row.project_count }} |
{{ row.portfolio_composite_risk|default(0) }} |
{{ row.normalized_risk_score|default(0) }} |
{{ row.findings_count }} |
{% if row.has_kev %}🔒{% else %}-{% endif %} |
{% if row.has_exploits %}💥{% else %}-{% endif %} |
{% endfor %}
{% endif %}