Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
After your CI/CD pipeline completes a scan with Defender for Cloud CLI, you can review the results in Cloud Security Explorer. Cloud Security Explorer lets you query and visualize the relationship between your CI/CD pipelines and container images, helping you identify vulnerabilities and track security findings across your DevOps environment.
Query pipeline results
After the pipeline runs successfully, go to Microsoft Defender for Cloud.
In the Defender for Cloud menu, select Cloud Security Explorer.
Select Select resource types dropdown, select DevOps, and then select Done.
Select the + icon to add new search criteria.
Choose the Select condition dropdown. Then select Data, and then select Pushes.
Choose the Select resource types dropdown. Then select Containers, then Container Images, and then select Done.
Select the scope you selected during the creation of the integration in Environment settings.
Select Search.
See the results of pipeline to images mapping.
Correlate with monitored containers
- In Cloud Security Explorer, enter the following query: CI/CD Pipeline -> Pipeline + Container Images -> Contained in + Container registries (group).
- Review the resource names to see the container mapping.