Cloud Context
Cloud context platforms collect runtime, posture, and exposure data from your cloud and infrastructure environments. This data describes what is actually deployed, reachable, and running in production.
OX connects to third-party cloud security and infrastructure tools to import this data, enrich it with OX context, and present it alongside findings from SAST, SCA, DAST, and pipeline scanning.
OX does not scan your cloud environment directly through these integrations. Each connector reads data through the vendor’s API, then maps cloud assets, workloads, and posture signals to your applications, repositories, and workflows in OX so you can triage, prioritize, and report consistently.
Where You Will See Cloud Context Data in OX
Active Issues: Filter by Source tool to focus on findings enriched by a specific cloud provider.
Issue details: Tabs include cloud asset data, exposure indicators, runtime context, and OX correlations such as application and repository mapping.
Assets and Applications: Imported cloud assets and workloads appear in asset views, application context, and dashboards.
Risk prioritization: Findings are ranked using combined development, pipeline, and runtime signals.
Supported Cloud Context Connectors
The following cloud context connectors are supported:
OX Cloud Context
Kong
Microsoft Defender for Cloud
Oligo
Orca Security
PAN: Prisma Cloud (CSPM)
SentinelOne
Upwind
Qualys
Solace
Sysdig
Tenable
Tenable Cloud Security
Wiz
When a cloud context connector is active, OX continuously imports cloud posture, workload, and exposure data and links it to existing security findings across your environment.
How Data from Cloud Context Connectors Is Used by OX
Each connected platform can provide different types of cloud context, depending on the vendor and the permissions you configure. This may include:
Cloud asset identifiers, such as virtual machines, containers, clusters, and services
Exposure and reachability indicators, such as internet-facing or network-accessible assets
Runtime signals, such as active workloads and observed processes
Posture and configuration data, such as misconfigurations and policy violations
Provider-specific metadata used to improve asset and application mapping
This information helps OX determine which issues affect running systems and which findings represent theoretical risk only.
Choosing a Cloud Context Provider
Different cloud context platforms specialize in different types of visibility. Your choice should reflect what kind of signal you want to bring into OX.
Posture-focused platforms These platforms emphasize configuration and compliance across cloud accounts, subscriptions, and services. Use them if your priority is identifying misconfigurations, policy violations, and cloud governance gaps.
Runtime-focused platforms These platforms monitor running workloads, processes, and behaviors in real time. Use them if you need visibility into what is actively executing in your environment and how workloads behave at runtime.
Exposure and attack surface platforms These platforms focus on identifying internet-facing, reachable, or externally exposed assets. Use them if your priority is understanding which systems are accessible from outside your environment.
If you already use a cloud security platform, start with that provider to extend its visibility into OX. You can also connect more than one provider to combine posture, runtime, and exposure signals in a single risk view.
If you want, I can also tighten
Last updated
