Overview
The Cloud Workloads Dashboard in DeepTraQ provides a centralized interface for monitoring, analyzing, and managing vulnerabilities across cloud infrastructure. It consolidates workload security findings from cloud scans and presents them in a unified view, enabling security teams to quickly identify risks and prioritize remediation.
From the dashboard, users can initiate vulnerability assessments, review scan results, investigate findings, and track security improvements over time. The platform also enables teams to perform actions such as triaging vulnerabilities, accepting risk with justification, or marking findings as false positives.
Supported Platforms
Cloud workload security monitoring supports environments deployed on:
- Amazon Web Services (AWS)
- Microsoft Azure
- Google Cloud Platform (GCP)
Assets from these environments are discovered through cloud connectors and included in vulnerability assessments.
Prerequisites
- A cloud connector must be configured for the target environment.
- Cloud resources must be accessible for asset discovery.
- At least one vulnerability scan must be executed to populate the dashboard with findings.
Cloud Workloads Dashboard
The Cloud Workloads Dashboard provides a unified view of vulnerabilities detected across the cloud infrastructure.
Key capabilities include:
- Viewing vulnerabilities across all workloads in a single dashboard
- Initiating new vulnerability assessments
- Reviewing severity-based vulnerability summaries
- Accessing detailed findings with CVE intelligence
- Monitoring scan history and security trends
This centralized visibility enables teams to quickly understand the security posture of their cloud workloads.
Initiating a Vulnerability Assessment
Users can start a new vulnerability assessment directly from the dashboard.
During scan creation, users must select the cloud provider environment and configure the scan parameters required for the assessment.
Example workflow:
- Navigate to the Cloud Workloads Dashboard.
- Select the option to initiate a new vulnerability scan.
- Choose the cloud provider environment such as Azure.
- Import cloud resources from the selected environment.
- Configure scan parameters according to security requirements.
- Select the scanners to be used for the assessment.
- Start the scan to begin vulnerability analysis.
Viewing Scan Results
Once a scan completes, the dashboard provides a comprehensive view of the findings.
Users can review:
- Severity-based vulnerability summaries
- Detailed vulnerability findings
- CVE intelligence and technical context
- Affected assets and services
These insights help teams understand the impact of vulnerabilities across their environment.
Vulnerability Management Actions
DeepTraQ allows users to manage findings directly within the dashboard.
Available actions include:
- Marking a vulnerability as False Positive
- Accepting risk with justification
- Adding comments to provide investigation context
These actions support collaboration between security and engineering teams and maintain clear documentation of remediation decisions.
Triage and Assignment
The platform allows security teams to triage vulnerabilities and assign tasks to team members.
Triage helps organize findings based on priority and track remediation activities. Users can assign findings to responsible team members and monitor progress as vulnerabilities are addressed.
Scan History and Comparison
All previous scan executions are stored within the platform.
Users can open historical scans to:
- Compare results between different scan runs
- Identify newly introduced vulnerabilities
- Track remediation progress
- Analyze security posture trends
This historical view supports long-term vulnerability management and continuous improvement.
Continuous Security Monitoring
DeepTraQ supports repeated scans and scheduled assessments to maintain continuous visibility into the cloud environment.
Users can schedule automated scans to ensure vulnerabilities are regularly identified and remediated. The platform supports running scans multiple times without restrictions, enabling continuous monitoring of evolving cloud workloads.
Field Reference
| Field | Description | Example |
|---|---|---|
| Cloud Provider | The cloud environment selected for vulnerability assessment. | Azure |
| Import Resources | Imports assets from the connected cloud environment. | Import Azure Resources |
| Scanner Selection | Determines which scanning engines will be used. | Port Scan |
| Vulnerability Summary | Displays vulnerabilities grouped by severity. | Critical: 2 |
| CVE Intelligence | Provides technical details about detected vulnerabilities. | CVE-2024-12345 |
| Scan History | Displays previous scan executions for comparison. | Scan Run 2026-03-05 |