๐๐๐ฉ ๐๐จ๐ง๐ญ๐๐ข๐ง๐๐ซ ๐๐ฆ๐๐ ๐๐ฌ ๐๐ซ๐จ๐ฆ ๐๐จ๐๐ ๐ญ๐จ ๐๐ฅ๐จ๐ฎ๐ ๐ฐ๐ข๐ญ๐ก ๐๐๐๐๐ง๐๐๐ซ ๐๐จ๐ซ ๐๐ฅ๐จ๐ฎ๐
When a vulnerability is identified in a container image stored in a container registry or running in a Kubernetes cluster, it can be difficult for a security practitioner to trace back to the CI/CD pipeline that first built the container image and identify a developer remediation owner.
With DevOps security capabilities in Microsoft Defender Cloud Security Posture Management (CSPM), you can map your cloud-native applications from code to cloud to easily kick off developer remediation workflows and reduce the time to remediation of vulnerabilities in your container images.
Details: https://learn.microsoft.com/en-us/azure/defender-for-cloud/container-image-mapping
#defender #cspm #CloudSecurityPostureManagement #devops #pipeline #codetocloud #container #vulnerabilities #Kubernetes #cnapp #cwpp #cloudnative #cloudsecurity #soc #microsoft #microsoftsecurity #azure #multicoud