Workload Security
Techniques for protecting workloads deployed across multiple cloud platforms by leveraging security scans for container images and machine images in AWS and Azure.
Scan in Workload Security - AWS (AMI & ECR)
- Log in to the Platform
- Access the platform and sign in using your credentials.
 
 - Navigate to Cloud Ops
- 
Locate the Side Navigation Bar on the left-hand side of the screen.
 - 
Click on the Workload Security tab to access its features.
 
 - 
 
- Verify AWS Account
- 
Ensure that an AWS account has already been added to the platform.
 - 
If no account is available, click on + Add New Account..
 
 - 
 - Select a Scan Type
- 
Choose from the following scan options:
 - AMI (Amazon Machine Image) scan for VM security.
 - ECR (Elastic Container Registry) scan for container images.
 
 - 
 - Initiate the Scan
- Select the target AWS account.
 - Click Scan to open a new input form.
 
 

- 
- Choose the Region from the drop down list.
 - Provide the Image URI (enabled after Region selection).
 - Click Proceed to start the scan.
 
 
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
 
 
- 
- Upon completion, review results highlighting:
- Security risks
 - Vulnerabilities
 - Compliance issues
 
 
 - Upon completion, review results highlighting:
 
Scan in Workload Security - Azure (ACR)
- 
- Log in to the Platform
- Access the platform and sign in using your credentials.
 
 - Navigate to Cloud Ops
- 
Locate the Side Navigation Bar on the left-hand side of the screen.
 - 
Click on the Workload Security tab to access its features.
 
 - 
 
 - Log in to the Platform
 
- Verify Azure Account
- 
Ensure that an Azure account has already been added to the platform.
 - 
If no account is available, click on + Add New Account..
 
 - 
 - Choose ACR Scan Option
- Select ACR (Azure Container Registry) Scan.
 
 - Initiate the Scan
- Select the target Azure account.
 - Click Scan to open a new input form.
 
 
- 
- Choose the Region from the drop down list.
 - Select the Registry (enabled after Region selection).
 - Choose the Repository (enabled after Registry selection).
 - Provide the Image URI (enabled after Repository selection).
 - Click Proceed to start the scan.
 
 
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
 
 - Monitor scan progress, and upon completion, a report will be generated then open it.
 
- 
- Upon completion, review results highlighting:
- Security risks
 - Vulnerabilities
 - Compliance issues
 
 
 - Upon completion, review results highlighting:
 
Note:
- For accessing historic reports or addressing scan failures, refer to the Report History Page for further details and View error.
 
                







