Edit

Share via


Review CI/CD pipeline results in Cloud Security Explorer

After your CI/CD pipeline completes a scan with Defender for Cloud CLI, you can review the results in Cloud Security Explorer. Cloud Security Explorer lets you query and visualize the relationship between your CI/CD pipelines and container images, helping you identify vulnerabilities and track security findings across your DevOps environment.

Query pipeline results

  1. After the pipeline runs successfully, go to Microsoft Defender for Cloud.

  2. In the Defender for Cloud menu, select Cloud Security Explorer.

  3. Select Select resource types dropdown, select DevOps, and then select Done.

    Screenshot of CI/CD pipeline in Cloud Security Explorer.

  4. Select the + icon to add new search criteria.

    Screenshot of new search in Cloud Security Explorer.

  5. Choose the Select condition dropdown. Then select Data, and then select Pushes.

    Screenshot of selecting condition Cloud Security Explorer.

  6. Choose the Select resource types dropdown. Then select Containers, then Container Images, and then select Done.

    Screenshot of selecting container images in Cloud Security Explorer.

  7. Select the scope you selected during the creation of the integration in Environment settings.

    Screenshot of selecting scope in Cloud Security Explorer.

  8. Select Search.

    Screenshot of CI/CD pipeline in Cloud Security Explorer.

  9. See the results of pipeline to images mapping.

Correlate with monitored containers

  1. In Cloud Security Explorer, enter the following query: CI/CD Pipeline -> Pipeline + Container Images -> Contained in + Container registries (group).
  2. Review the resource names to see the container mapping.