Performing Security and Operational Scans


Executing Scans in CloudOps

Running Scans in Cloud Operations

image.png

Untitled design (13).png

hhhhh.png

Once the scan is complete:

These results help identify opportunities to reduce cloud costs and improve infrastructure efficiency.

Untitled design (14).png

Untitled design (15).png

Note:

Running a Scan in Resource Manager (Assets)

11.png


Note:

Conducting Cloud Security Assessments

Ensuring cloud security requires regular vulnerability assessments and compliance checks across various cloud environments. The SecOps module in XOps 360 enables organizations to evaluate their security posture and compliance status across AWS, Azure, and Microsoft environments including Microsoft 365 and Entra ID.

This guide outlines the steps required to initiate compliance scans and review security findings.

Cloud Security – AWS Security Assessment

image.png

Untitled design (18).png


Monitor and Review Results

Untitled design (19).png


Untitled design (20).png


Cloud Security – Azure Security

image.png


Untitled design (24).png


Monitor and Review Results

Untitled design (22).png


Untitled design (25).png


Cloud Security – Microsoft Security (M365 & Entra ID)

Microsoft Entra ID Security Assessment

image.png


Untitled design (27).png

Monitor and Review Results

Untitled design (28).png


Untitled design (29).png

Microsoft 365 Security Assessment

image.png

Untitled design (30).png

Untitled design (33).png


Note:

Performing Cyber Security Evaluations

OSINT Analysis Scan in Cyber Security

Perform an OSINT Analysis scan to gather intelligence and identify potential vulnerabilities for a domain.

image.png

Untitled design.png

Untitled design (1).png


Untitled design (2).png


DAST Scan in Cyber Security

Conduct a Dynamic Application Security Test (DAST) to detect vulnerabilities in a web application.

image.png


Untitled design (3).png


Untitled design (4).png

Untitled design (5).png

Network Security Scan in Cyber Security

Conduct a network security scan to identify vulnerabilities, misconfigurations, and potential threats.

image.png

Untitled design (6).png


Untitled design (7).png


Untitled design (8).png


Note:

Workload Security

Techniques for protecting workloads deployed across multiple cloud platforms by leveraging security scans for container images and machine images in AWS and Azure.

Scan in Workload Security - AWS (AMI & ECR)

image.png

image.png

image.png

image.png

image.png

Scan in Workload Security - Azure (ACR)

image.png

image.png

image.png

image.png

image.png

Note: