Viewing CSPM Scan Results
Overview
Learn how to view cloud security scan results, analyze misconfigurations, and track security posture from the DeepTraQ dashboard.
This section helps you:
- Navigate CSPM scan result views
- Understand cloud misconfiguration findings
- Filter and refine results
- Perform triage actions
- Track compliance and security trends
- Compare scans over time
Embed Storylane walkthrough video here.
Prerequisites
- At least one completed Cloud Security (CSPM) scan
- Access to the Cloud Security Misconfigurations dashboard
Steps to View Scan Results
- Navigate to Cloud Security → Scans
- Select the desired scan (e.g., AWS Demo Scan)
- Click the scan name to open results
- You will land on the Misconfigurations tab by default
Scan Result Tabs
Each scan provides multiple views for analysis:
1. Misconfigurations (Default View)
- Displays detected cloud security issues
- Includes affected resources and severity
- Primary workspace for analysis and remediation
2. Details
-
Provides in-depth information for each finding
-
Includes:
- Description
- Impact
- References
- Mitigation steps
- Compliance classification
3. Analytics
-
High-level view of cloud security posture
-
Includes:
- Security health scores
- Recurring misconfigurations
- Resource vs misconfiguration trends
4. History & Comparison
- Track scan results over time
- Compare previous scans
- Identify improvements and new risks
Filtering & Search
Use filters to quickly narrow down results:
- Targets Filter → Focus on specific cloud resources
- Previous Scans Filter → Switch between past scans
- Search Bar → Find misconfigurations by keywords
Click Apply to update results.
Viewing Misconfiguration Details
- Click on a misconfiguration
- Select Details
You can view:
- Description
- Affected resource
- Severity and impact
- Step-by-step remediation guidance
- Compliance mappings (e.g., CIS, NIST, PCI DSS)
AI-Powered Insights
DeepTraQ AI enhances scan results by:
- Mapping findings to compliance frameworks
- Providing step-by-step remediation guidance
- Generating executive-level insights
- Calculating overall cloud security health scores
Triage Actions
Take action directly on findings:
- Accept Risk → Acknowledge with justification
- Mark as False Positive → Exclude incorrect findings
- Add Comments → Provide context and collaborate
These actions help prioritize remediation and maintain audit traceability.
Tracking Trends & Compliance
- Monitor recurring misconfigurations
- Track compliance scores across frameworks (CIS, NIST, PCI DSS)
- Visualize relationship between cloud growth and security risks
Comparing Scans
- Select a previous scan as baseline
- Choose a target scan for comparison
- Generate side-by-side comparison
Analyze:
- Security improvements
- Newly introduced risks
- Resolved misconfigurations
Misconfiguration Lifecycle Tracking
- Track resolved misconfigurations
- Ensure issues are properly fixed
- Review historical trends over time
Navigating Scan History
- Click on scan timestamps to view past results
- Analyze changes across different scan runs
- Use historical data for audit and reporting
Field Reference
| Field | Description | Example |
|---|---|---|
| Misconfigurations | List of detected cloud issues | Public S3 Bucket |
| Details | In-depth finding information | Remediation steps |
| Analytics | Security posture insights | Security score |
| History | Previous scan results | Scan on Jan 10 |
| Targets Filter | Filter by cloud resources | EC2 Instance |
| Previous Scans | Switch between scans | Last 5 scans |
| Compliance Mapping | Framework alignment | CIS AWS 1.4 |
| Comparison | Scan-to-scan analysis | Before vs After |