๐Œ๐š๐ฉ ๐‚๐จ๐ง๐ญ๐š๐ข๐ง๐ž๐ซ ๐ˆ๐ฆ๐š๐ ๐ž๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐‚๐จ๐๐ž ๐ญ๐จ ๐‚๐ฅ๐จ๐ฎ๐ ๐ฐ๐ข๐ญ๐ก ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐

When a vulnerability is identified in a container image stored in a container registry or running in a Kubernetes cluster, it can be difficult for a security practitioner to trace back to the CI/CD pipeline that first built the container image and identify a developer remediation owner.

With DevOps security capabilities in Microsoft Defender Cloud Security Posture Management (CSPM), you can map your cloud-native applications from code to cloud to easily kick off developer remediation workflows and reduce the time to remediation of vulnerabilities in your container images.

https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/bridging-the-gap-between-code-and-cloud-with-defender-for-cloud/ba-p/4042557

Details: https://learn.microsoft.com/en-us/azure/defender-for-cloud/container-image-mapping

#defender #cspm #CloudSecurityPostureManagement #devops #pipeline #codetocloud #container #vulnerabilities #Kubernetes #cnapp #cwpp #cloudnative #cloudsecurity #soc #microsoft #microsoftsecurity #azure #multicoud

Bridging the Gap Between Code and Cloud with Defender for Cloud

This blog post explores how Defender for Cloud streamlines the process of tracing vulnerabilities in container images back to their origins in CI/CD pipeline..

TECHCOMMUNITY.MICROSOFT.COM