AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
new release April 14, 2024

Code Security Enhancements, Full Scan Support, Image Vulnerability Triaging, and More

Code Security Enhancements

With this release, there are major enhancements to Code Security:

  • Dedicated sections for Secrets and Vulnerabilities to dig deeper into occurrences, mapping them to files and scans.
  • Improved triaging of detected secrets and vulnerabilities.

The secrets scan dashboard
List of vulnerabilities in code

code-security-and-moreSS1

code-security-and-moreSS1


Full Scan Support

Initiate a Full Scan for GitHub or Bitbucket repositories directly from the Cloudanix Console.

This provides flexibility to start scans at will, in addition to the Weekly Automated Full Scans.

Full Scan Report for GitHub or Bitbucket

code-security-and-moreSS1

PR Check, Status, and Comments

With the latest release, customers can:

  • Enforce PR Checks to fail builds based on acceptable conditions
  • Add automated comments in PRs based on findings
  • Insert findings status in the PRs

This reduces friction between Engineering and Security by limiting security gaps in code from reaching production.

Enforce PR Checks to fail builds based on an acceptable condition

code-security-and-moreSS1

Image Vulnerability Triage

Slice and dice image vulnerability data even further using CVE or package-based filters.

Misconfiguration Policy Enhancements

We’ve expanded our AWS Misconfiguration Policy Set by another 150 policies, bringing the total to over 610. These additions provide parity with AWS Config and cover security rules across most AWS services.


Cloudanix Blogs

Additional Resources

Industry News



TODO:// is not an option for Cloud Security

cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More