# Performing Security and Operational Scans

# Executing Scans in CloudOps

### **Running Scans in Cloud Operations**

- **Log in to the Platform**
    - Access the platform and sign in using your credentials.
- **Navigate to CloudOps**
    - Locate the Side Navigation Bar on the left-hand side of the screen.
    - Click on the **CloudOps** module to expand the available options.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/rCfAFyWDdyDsXZb3-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/rCfAFyWDdyDsXZb3-image.png)

- **Verify Cloud Account**
    - Ensure that an **AWS or Azure account** has already been connected to the platform.
    - If no account is available, add a cloud account through the **Cloud Account Integration process** before initiating a scan.
- **Select a Scan Type**
    - From the **CloudOps module**, select the scan you want to perform.
        
        
        - **Resource Manager -** Provides a centralized inventory of cloud assets across AWS and Azure services. It allows users to fetch and view infrastructure resources such as compute, networking, storage, and identity services to monitor and manage cloud infrastructure efficiently.
        - **Unutilized Resources -** Detect unused AWS resources.
        - **Resource Optimizer -** Identify optimization opportunities across AWS resources.
        - **Azure WAR (Well-Architected Review)** – Evaluate Azure cloud architecture against Microsoft best practices.
- **Initiate the Scan**  
    
    - Select the **cloud account** from the available account list.
    - Click **Analyze** or **Scan** to initiate the scan for the selected account.
    - The platform will begin analyzing the selected cloud resources.

[![Untitled design (13).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/aIjQ1gsWjhUk7xFM-untitled-design-13.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/aIjQ1gsWjhUk7xFM-untitled-design-13.png)

- **Monitor and Review Results** The scan will start processing the selected cloud account.

[![hhhhh.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/MwK8BAKViSdnrr80-hhhhh.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/MwK8BAKViSdnrr80-hhhhh.png)

Once the scan is complete:

- - A report will be generated automatically.
    - Results will display identified **optimization opportunities or unused resources**.
    - Users can review detailed findings directly within the dashboard.

These results help identify opportunities to **reduce cloud costs and improve infrastructure efficiency**.

[![Untitled design (14).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/wKkaCFpf5DWSdByz-untitled-design-14.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/wKkaCFpf5DWSdByz-untitled-design-14.png)

[![Untitled design (15).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/QJCijkDpMSPY7B9M-untitled-design-15.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/QJCijkDpMSPY7B9M-untitled-design-15.png)

**Note:**

- > To receive recommendations for optimizing your resources in Resource Optimizer, kindly ensure that the **AWS Compute Optimizer** service is enabled in the AWS account linked with the Xops 360 portal.

### **Running a Scan in Resource Manager (Assets)**

- **Log in to the Platform**
    - - Access the platform and sign in using your credentials.
- **Navigate to Resource Manager**  
    
    - From the **Side Navigation Bar**, click :  
         CloudOps → Resource Manager  
        This page provides a **comprehensive inventory of cloud assets** across multiple services.
- **Verify AWS or Azure Account**
    - Ensure that an AWS account or Azure account has already been added to the platform.
    - If no account is available, add the account before initiating the scan.
- **Run the Scan** On the Resource Manager (Assets) page  
    
    - Select the desired **cloud account**.
    - Click **Scan** to fetch the latest cloud asset information.
    - The platform will begin retrieving resources from the selected cloud account.
        
        [![Untitled design (17).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/HnpqCvE30CwWxgfz-untitled-design-17.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/HnpqCvE30CwWxgfz-untitled-design-17.png)
- **Monitor and Review Results** The system will fetch the cloud resources and update the **Assets Dashboard**.  
    Once completed :
- - All discovered cloud resources will be displayed.
    - Resources will be categorized by service (EC2, ECS, IAM, S3, Lambda, etc.).
    - Users can review the inventory to better manage and monitor their cloud infrastructure.

[![11.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/rwmOpAtq5BFqPcgk-11.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/rwmOpAtq5BFqPcgk-11.png)

**Note:**

- For accessing historic reports or addressing scan failures, refer to the [Report History Page](https://xops-docs.axiomio.com/books/xops-360-documentation/page/accessing-and-managing-report-history) for further details and View error.

# Conducting Cloud Security Assessments

Ensuring cloud security requires regular vulnerability assessments and compliance checks across various cloud environments. The **SecOps module** in XOps 360 enables organizations to evaluate their **security posture and compliance status** across **AWS, Azure, and Microsoft environments** including **Microsoft 365 and Entra ID**.

This guide outlines the steps required to initiate compliance scans and review security findings.

### **Cloud Security – AWS Security Assessment**

- **Log in to the Platform**
    
    
    - Access the platform and sign in using your credentials.
- **Navigate to SecOps**
    - Open the **Side Navigation Bar** located on the left side of the screen.
    - Click **SecOps** to expand the available security modules.
    - Select **Compliance Dashboard** .
- **Select Compliance Standard**Under the Compliance Dashboard, choose one of the following AWS compliance frameworks:
    
    
    - **AWS CIS v5.0 (Center for Internet Security)**
    - **AWS SOC2 (System and Organization Controls 2)**
    - **AWS GDPR (General Data Protection Regulation)**
    - **AWS PCI DSS (Payment Card Industry Data Security Standard)**
- These frameworks evaluate AWS cloud configurations against industry security best practices.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/vr3lxa2DsXCWHl7q-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/vr3lxa2DsXCWHl7q-image.png)

- **Verify AWS Account**
    - Ensure that an AWS account has already been added to the platform.
    - If no account is available, integrate the AWS account before initiating the scan.
- **Initiate the Scan**
    - Locate the AWS account under the selected compliance framework.
    - Click **Scan** to initiate an automated security check.
    - The system will analyze AWS configurations and security controls.

[![Untitled design (18).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/SMxeORBe4wwI3RDi-untitled-design-18.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/SMxeORBe4wwI3RDi-untitled-design-18.png)

**Monitor and Review Results**

- Monitor scan progress, and upon completion, a report will be generated then open it.

[![Untitled design (19).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/34XATvDC69Pi8yEf-untitled-design-19.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/34XATvDC69Pi8yEf-untitled-design-19.png)

- Review findings, including:
    
    
    - Compliance gaps
    - Security misconfigurations
    - Vulnerabilities

[![Untitled design (20).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/eI6CHhIHu8YUyg7z-untitled-design-20.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/eI6CHhIHu8YUyg7z-untitled-design-20.png)

### **Cloud Security – Azure Security**

- **Log in to the Platform**
    
    
    - Access the platform and sign in using your credentials.
- **Navigate to SecOps**
    - Open the Side Navigation Bar
    - Click **SecOps → Compliance Dashboard**.
- **Select Azure Compliance Standard** Choose the compliance framework used to assess Azure security posture.  
    
    - Available frameworks include:
    - **ISO 27001 (International Organization for Standardization)**
    - **SOC2 (System and Organization Controls 2)**
    - **CIS (Center for Internet Security)**
- These frameworks analyze Azure configurations against established security standards.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/9U392YjGcCegYdWx-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/9U392YjGcCegYdWx-image.png)

- **Verify Azure Account**
    - Ensure that an Azure account has already been added to the platform.
    - If no account is available, connect the Azure account before running the scan.
- **Initiate the Scan**
    - Locate the **Azure subscription** listed under the selected compliance framework.
    - Click **Scan** to initiate the Azure security assessment.

[![Untitled design (24).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/Junzf4DDvzpvr857-untitled-design-24.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/Junzf4DDvzpvr857-untitled-design-24.png)

**Monitor and Review Results**

- Monitor scan progress, and upon completion, a report will be generated then open it.

[![Untitled design (22).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/CWn6YMI0S7vtuJq8-untitled-design-22.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/CWn6YMI0S7vtuJq8-untitled-design-22.png)

- Analyze scan results to detect:
    
    
    - Compliance gaps
    - Security misconfigurations
    - Vulnerabilities

[![Untitled design (25).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/Pi2z5DwyaYfJFRly-untitled-design-25.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/Pi2z5DwyaYfJFRly-untitled-design-25.png)

### **Cloud Security – Microsoft Security (M365 &amp; Entra ID)**

- **Log in to the Platform**
    
    
    - Access the platform and sign in using your credentials.
- **Navigate to SecOps**  
    
    - Open the Side Navigation Bar
    - Click **SecOps → Compliance Dashboard**.

**Microsoft Entra ID Security Assessment**

- **Select Entra ID**
- Under the Compliance Dashboard, click Entra ID.
- This feature evaluates identity security configurations within Microsoft Entra ID.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/VLasQiBxU8UMj2GF-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/VLasQiBxU8UMj2GF-image.png)

- **Verify Microsoft Tenant**  
    
    - Ensure that the **Microsoft Entra ID tenant** has already been connected to the platform.
    - If the tenant is not connected, integrate the Microsoft account before running the scan.
- **Initiate the Scan**
    - Locate the **Entra ID tenant** in the dashboard.
    - Click **Scan** to start the assessment.

[![Untitled design (27).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/zLIrkn3wfw6lmM1W-untitled-design-27.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/zLIrkn3wfw6lmM1W-untitled-design-27.png)

**Monitor and Review Results**

- Track scan progress in the **Scan History** section.

[![Untitled design (28).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/iOv20wVb65p6vkRN-untitled-design-28.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/iOv20wVb65p6vkRN-untitled-design-28.png)

- Review scan findings to identify:
    
    
    - Identity security issues
    - Authentication policy risks
    - Misconfigured access controls

[![Untitled design (29).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/z7p7oVLwGtwbv3qZ-untitled-design-29.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/z7p7oVLwGtwbv3qZ-untitled-design-29.png)

**Microsoft 365 Security Assessment**

- Select Microsoft 365
- Navigate to **SecOps → Compliance Dashboard → M365**.
- This feature evaluates the security posture of Microsoft 365 services.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/OXhmYU5wgYPVhEe0-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/OXhmYU5wgYPVhEe0-image.png)

- **Verify Microsoft 365 Tenant**  
    
    - Ensure that the **Microsoft 365 tenant** has been connected to the platform.
    - If no tenant is available, integrate the Microsoft account before initiating the scan.
- **Initiate the Scan**
    - Locate the **Microsoft 365 tenant** in the dashboard.
    - Click **Scan** to start the assessment.

[![Untitled design (30).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/ip7ap97Bptbb9ivS-untitled-design-30.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/ip7ap97Bptbb9ivS-untitled-design-30.png)

- **Monitor and Review Results**
    
    
    - Monitor scan progress under **Scan History**.
        
        [![Untitled design (32).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/cpKYHsiIGrfGBE4S-untitled-design-32.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/cpKYHsiIGrfGBE4S-untitled-design-32.png)
        
        
        - Once the scan is completed, review findings such as:
        - Security gaps
        - Compliance violations
        - Configuration risks

[![Untitled design (33).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/AXU40AWXbMCiQHXW-untitled-design-33.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/AXU40AWXbMCiQHXW-untitled-design-33.png)

- These results help strengthen the **Microsoft 365 security posture**.

 **Note:**

- For accessing historic reports or addressing scan failures, refer to the [Report History Page](https://xops-docs.axiomio.com/books/xops-360-documentation/page/accessing-and-managing-report-history) for further details and View error.

# Performing Cyber Security Evaluations

#### **OSINT Analysis Scan in Cyber Security**

Perform an OSINT Analysis scan to gather intelligence and identify potential vulnerabilities for a domain.

- **Log In to the Platform**
    - Use your credentials to log in to the platform.
- **Navigate to the Cyber Security Section**
    - Locate the **Side Navigation Bar** on the left side of the platform.
    - Click on the **SecOps** section to expand its options.
- **Open Cyber Security Module**
    
    
    - Under **SecOps**, select **Cyber Security** to access the available security evaluation tools.
- **Select OSINT Analysis Scan**
    - Within the **Cyber Security** section, click on **OSINT Analysis** to open the OSINT scanning interface where you can perform domain intelligence analysis.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/Z70jdJhTrIz7khFB-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/Z70jdJhTrIz7khFB-image.png)

- **Enter the Domain**
    - In the **OSINT Scan** input field, type the domain you want to scan (e.g., example.com).
- **Initiate the Scan**
    - Click the **Scan** button to start the OSINT scan for the entered domain.

[![Untitled design.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/BtF6oUrFwFVa0wQO-untitled-design.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/BtF6oUrFwFVa0wQO-untitled-design.png)

- **Monitor and Review Results**
    - Monitor scan progress, and upon completion, a report will be generated then open it.

[![Untitled design (1).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/WuZLiPr4r5bXJ9XZ-untitled-design-1.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/WuZLiPr4r5bXJ9XZ-untitled-design-1.png)

- - Once the scan is complete, detailed results will be displayed for analysis.
    - Use the results to identify potential vulnerabilities or gather intelligence on the domain.

[![Untitled design (2).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/32abrMXMuJQzWEs5-untitled-design-2.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/32abrMXMuJQzWEs5-untitled-design-2.png)

#### **DAST Scan in Cyber Security**

Conduct a Dynamic Application Security Test (DAST) to detect vulnerabilities in a web application.

- **Log In to the Platform**
    - Use your credentials to log in to the platform.
- **Navigate to the Cyber Security Section**
    - Locate the **Side Navigation Bar** on the left side of the platform.
    - Click on the **SecOps** section to expand its options.
- **Open Cyber Security Module**
    - Under **SecOps**, select Cyber Security to access the available security tools.
- **Select the DAST Scan Option**
    - Within the **Cyber Security** section, select **DAST** to open the DAST scanning interface and begin testing the web application for vulnerabilities.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/9o2a98uPloaE5YK5-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/9o2a98uPloaE5YK5-image.png)

- **Enter the Domain**
    - In the **DAST Scan** input field, type the domain you want to scan (e.g., example.com).
- **Choose the Type of Scan**
    - Select the type of scan based on your needs: 
        - **Basic Scan**: Performs a general security assessment of the domain.
        - **Advanced Scan**: Conducts a thorough and detailed security evaluation with advanced checks.
- **Initiate the Scan**  
    
    - Click respective button to start scanning process

[![Untitled design (3).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/0ifi5jic2sH8Z2dg-untitled-design-3.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/0ifi5jic2sH8Z2dg-untitled-design-3.png)

- **Monitor and Review Results**
    - Monitor scan progress, and upon completion, a report will be generated then open it.

[![Untitled design (4).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/2jyrBj2r27elXJbM-untitled-design-4.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/2jyrBj2r27elXJbM-untitled-design-4.png)

- - After the scan is complete, detailed results will be displayed for review.
    - Analyze the findings to identify vulnerabilities and take necessary actions.

[![Untitled design (5).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/GeU5PGTO6wWrmiy1-untitled-design-5.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/GeU5PGTO6wWrmiy1-untitled-design-5.png)



#### **Network Security Scan in Cyber Security**

Conduct a network security scan to identify vulnerabilities, misconfigurations, and potential threats.

- **Log In to the Platform**
    - Enter your **username** and **password** to access the platform.
- **Navigate to the Cyber Security Section**
    - Locate the **Side Navigation Bar** on the left side of the platform.
    - Click on the **SecOps** section to expand its options.
- **Open Cyber Security Module**  
    
    - Under ****SecOps**,** select ****Cyber Security**** to access the available security tools.
- **Select the Network Security Scan Option**
    - Within the **Cyber Security** section, select **Network Security** to initiate the network security scanning process and analyze potential risks.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/rD47n8RSyW8wHoLh-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/rD47n8RSyW8wHoLh-image.png)

- **Enter the Domain**
    - In the **Network Security Scan** field, type the domain you want to scan (e.g., **example.com** or **IP Address**)
- **Initiate the Scan**
    - Click the **Scan** button to begin the Network Security Scan.

[![Untitled design (6).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/Yacy7ZdgkNuN4SXw-untitled-design-6.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/Yacy7ZdgkNuN4SXw-untitled-design-6.png)

- **Monitor and Review Results**
    - Monitor scan progress, and upon completion, a report will be generated then open it.

[![Untitled design (7).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/gLb7LrWnyBYNvtk6-untitled-design-7.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/gLb7LrWnyBYNvtk6-untitled-design-7.png)

- - Once the scan is complete, detailed results will be displayed for: 
        - Identified vulnerabilities
        - Network misconfigurations
        - Potential threats

[![Untitled design (8).png](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/scaled-1680-/TGwF2uGmMJEjmbkH-untitled-design-8.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2026-03/TGwF2uGmMJEjmbkH-untitled-design-8.png)

**Note:**

- For accessing historic reports or addressing scan failures, refer to the [Report History Page](https://xops-docs.axiomio.com/books/xops-360-documentation/page/accessing-and-managing-report-history) for further details and View error.

# Workload Security

Techniques for protecting workloads deployed across multiple cloud platforms by leveraging security scans for container images and machine images in AWS and Azure.

#### **Scan in Workload Security - AWS (AMI &amp; ECR)**

- **Log in to the Platform**
    - Access the platform and sign in using your credentials.
- **Navigate to Cloud Ops**
    - Locate the Side Navigation Bar on the left-hand side of the screen.
    - Click on the **Workload Security** tab to access its features.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/fwTMfoQY2VKcs91t-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/fwTMfoQY2VKcs91t-image.png)

- **Verify AWS Account**
    - Ensure that an AWS account has already been added to the platform.
    - If no account is available, click on **+ Add New Account**..
- **Select a Scan Type**
    - Choose from the following scan options:
    - **AMI (Amazon Machine Image)** scan for VM security.
    - **ECR (Elastic Container Registry)** scan for container images.
- **Initiate the Scan**
    - Select the target AWS account.
    - Click **Scan** to open a new input form.

![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/Box4MGCIm8Rt3DgE-image.png)

- - Choose the **Region** from the drop down list.
    - Provide the **Image URI** (enabled after Region selection).
    - Click **Proceed** to start the scan.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/MAmyAp6tPClaJPka-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/MAmyAp6tPClaJPka-image.png)

- **Monitor and Review Results**
    - Monitor scan progress, and upon completion, a report will be generated then open it.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/ugfG6DGHexb0ZyGO-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/ugfG6DGHexb0ZyGO-image.png)

- - Upon completion, review results highlighting: 
        - Security risks
        - Vulnerabilities
        - Compliance issues

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/Q2xmNtMaW2MHzryW-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/Q2xmNtMaW2MHzryW-image.png)


#### **Scan in Workload Security - Azure (ACR)**

- - **Log in to the Platform**
        - Access the platform and sign in using your credentials.
    - **Navigate to Cloud Ops**
        - Locate the Side Navigation Bar on the left-hand side of the screen.
        - Click on the **Workload Security** tab to access its features.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/5wbuSpm0c5ZSXu16-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/5wbuSpm0c5ZSXu16-image.png)

- **Verify Azure Account**
    - Ensure that an Azure account has already been added to the platform.
    - If no account is available, click on **+ Add New Account**..
- **Choose ACR Scan Option**
    - Select **ACR (Azure Container Registry)** Scan.
- **Initiate the Scan**
    - Select the target Azure account.
    - Click **Scan** to open a new input form.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/OQ7jZTmqtYuy4Bxc-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/OQ7jZTmqtYuy4Bxc-image.png)

- - Choose the **Region** from the drop down list.
    - Select the **Registry** (enabled after Region selection).
    - Choose the **Repository** (enabled after Registry selection).
    - Provide the **Image URI** (enabled after Repository selection).
    - Click **Proceed** to start the scan.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/xGrv7FP2BaJlsprl-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/xGrv7FP2BaJlsprl-image.png)

- **Monitor and Review Results**
    - Monitor scan progress, and upon completion, a report will be generated then open it.

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/7oYt3q62tDyIYk57-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/7oYt3q62tDyIYk57-image.png)

- - Upon completion, review results highlighting: 
        - Security risks
        - Vulnerabilities
        - Compliance issues

[![image.png](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/scaled-1680-/KLExHYVLY5X0l1Iz-image.png)](https://xops-docs.axiomio.com/uploads/images/gallery/2025-02/KLExHYVLY5X0l1Iz-image.png)

**Note:**

- For accessing historic reports or addressing scan failures, refer to the [Report History Page](https://xops-docs.axiomio.com/books/xops-360-documentation/page/accessing-and-managing-report-history) for further details and View error.