# Planning Next Steps

After reviewing your first scan results, plan the next steps to tailor OX to your environment and workflow:

* **Connect Container Registries and Cloud Accounts:** Add container registries and cloud accounts if they are relevant to your environment. This is optional and depends on the type of applications you manage.
* [**Connect Your Ticketing and Messaging Systems:**](https://docs.ox.security/ticketing-and-messaging/about-messaging-and-ticketing-in-ox) Connect systems such as Jira to streamline issue creation and assignment from OX.
* [**Connect CI/CD Pipelines:**](https://docs.ox.security/scan-and-analyze-with-ox/scanning/scanning-ci-cd-pipelines) Integrate your pipelines to scan, build artifacts, and enforce security checks during development. This step is more advanced and not required for your first scan.
* [**Configure Workflows:**](https://docs.ox.security/automate-with-ox-workflows/ox-automations) Adjust or create workflows to define how issues should be handled, routed, or automated across your teams.
* [**Enable Runtime Visibility:**](https://docs.ox.security/secure-runtime/ox-runtime-sensor) Connect your runtime environment to help OX understand which components are actually used in production.
* [**Fine-tune Policies:**](https://docs.ox.security/ox-policies/policies) Review the built-in policies, such as License Policy and other security policies, and confirm they reflect the rules you want to enforce in your organization.
