Resources

The Resources page provides a unified dashboard interface to view and explore all resources across your cloud, Kubernetes and container environments.

Built on Sysdig’s graph database technology, this feature lets you:

  • Browse resource types organized by category, such as Compute, Storage, and Network.
  • Search and Filter resources using dynamic, schema-aware filters.
  • Export filtered data for analysis and reporting.

This inventory uses graph-based queries to provide a streamlined way to explore resources across your environment.

Prerequisites

Inventory displays all resources from cloud accounts, Kubernetes data sources, and IaC Git resources connected to Sysdig, along with their findings for compliance, vulnerabilities, exposure and more. If expected results do not appear, review these prerequisites:

  • Newly created Posture policies are not assigned to any zone by default. To see compliance findings from new policies, Link a Policy to a Zone.
  • Data shown in the UI is refreshed every 24 hours when a compliance evaluation is run. Data from newly added Zones may take up to 24 hours to appear.
  • Data in Inventory Resources is retained for 7 days. For more details, see Data Retention.

Enable Inventory Resources

ResourcesConfigurationRequired
Cloud resources (AWS, GCP, Azure)Connect a cloud account.
See Connect Cloud Accounts.
Yes
Kubernetes resources (Users, Roles, Groups, Hosts, Workloads…)Install the Sysdig agent with Kubernetes Security Posture Management (KSPM) enabled, using --set global.kspm.deploy=true \.
See Install Kubernetes.
Yes
Container ImagesWhen installing the Sysdig agent for Kubernetes resources, above, also install the Runtime Image Scanner. This is included automatically when you install the agent using the Quick Start Wizard.
See Install Kubernetes.
Yes
Standalone Hosts (Linux, Docker)Install the Posture Host Analyzer (non-Kubernetes) as a container. See Install Posture Host AnalyzerNo
IaC CodeCheck the IaC Supportability Matrix.
- Set up a Git Integration.
- Add Git Sources.
See Git Integrations.
No
Vulnerable cloud hostsAgent-based or Agentless Vulnerability Host ScanningNo
Vulnerable packages running on Kubernetes WorkloadsRequires Risk Spotlight, which is auto-enabled from Sysdig agent v.12.15+.
See Risk Spotlight.
No

Accessing Graph Inventory

Use the Inventory > Resources page to view and explore resources across your environment.

Access the Resources Page

  1. Log in to Sysdig Secure.
  2. From the left navigation, select Inventory > Resources. If it isn’t already enabled, switch to new experience using the Try the New Experience toggle in the top-right corner.

Interface layout

The Resources page is organized into three main areas:

  • Left Navigation Panel: Displays a hierarchical tree of resource types.
  • Main Content Area: Shows the All Resources summary or a data table for the selected resource type.
  • Filter Bar: Provides contextual filters that appear when you select a resource or category.

Left Navigation Panel

The left navigation panel groups available resources into a searchable, hierarchical tree:

  • Search bar: Filter resource types by name or category.
  • All Resources: A top-level view that summarizes all available resource types.
  • Categories: Expandable groups such as Compute, Storage, and Network, listed alphabetically.
  • Resource types: Individual entities displayed with icons (for example, EC2 instances, S3 buckets, or Kubernetes pods).

Main Content Area

The main content area updates based on your selection:

  • All Resources view: Displays a table of all available resource types. Select a row to open the corresponding resource type view.
  • Entity detail view: Displays detailed information for a selected resource type, including:
    • Filter bar
    • Paginated data table
    • Export button

Side Panel Details

From the entity detail view, select a row in the data table. It provides detailed information about the selected resource:

  • Complete set of resource properties and values
  • Related entities
  • Action buttons for supported operations

View Resource Details

Click on any resource to open the Resource Details drawer. This drawer summarizes everything Sysdig knows about a resource — all of its findings, events, misconfigurations, metadata, environment information, and more.

To open the Resource Details drawer:

  1. Log in to Sysdig Secure.

  2. Navigate to Inventory > Resources.

  3. Perform a search or filter the resources page.

  4. From the results, select a resource.

    The Resource Details drawer opens.

This drawer lets you determine the status of a resource, and answer questions, such as:

  • Does this resource have a ticket open on it?
  • What’s the status of the ticket?
  • Is this resource under investigation by our SOC team?

Remediate Vulnerabilities with the Resource Details Drawer

A possible work flow for using the Resource Details drawer to remediate a vulnerability might be:

  1. In the Sysdig Secure UI, you navigate to Inventory > Resources.
  2. You select a resource. The Resource Details drawer opens.
  3. On the Highlights tab, you learn the resource is exposed to the internet, and has a critical vulnerability.
  4. You select the Vulnerabilities tab to learn more, and discover the critical vulnerability has a remediation.
  5. The remediation involves updating a Python package. You copy the details.
  6. You select Create Ticket to open a Jira ticket form.
  7. You paste the details of the vulnerability and the remediation, and assign it to an engineer to implement.

The Resource Details drawer features several tabs, each covering a different category of information about the resource. You can navigate through the tabs to accomplish different goals, like creating a Jira ticket, or discovering what vulnerabilities are associated with a resource.

Highlights Tab

This tab offers a high level security overview for the selected resource, including Top Security Issues, Runtime Insights, Metadata, Resource Labels, and Assigned Zones.

Click on any of the information displayed, such as the names of the assigned zones or the attached labels, to copy it to your clipboard.

Risks Tab

The Risks tab provides a centralized view of all Risk Findings associated with a specific resource. This includes details such as:

  • Risk Definition – A short description of the potential issue.
  • Severity – Critical, High, Medium, or Low.
  • Finding Categories – What type of issue was detected (e.g., Exposed, Vulnerability, or Configuration).
  • Context – Additional details such as whether the issue is actively in use, or has exploit.

You can filter the table by Severity to focus on the most urgent risks.

Click on a row to open the full Risk Finding drawer, with further details and remediation guidance.

Vulnerabilities Tab

The Vulnerabilities tab displays the latest runtime vulnerabilities scan results for that image or workload. This tab lists all of the CVEs identified on this specific resource, with information such as CVE ID, Severity, Context (In Use, Has Exploit, Has Fix, Exception Exists), the Exploit Prediction Scoring System (EPSS) score, the image it is found on, and the package/path.

You can filter the list of vulnerabilities by Name, Severity, and Context. The available Context filters are: In Use, Has Exploit, Has Fix, and whether any Exception exists.

Click the Severity or EPSS columns to sort the list in ascending or descending order of severity or EPSS score.

Click a CVE listing to open the full CVE details.

Here, you can:

  • Learn more about the vulnerability, such as where else it was reported, and whether a fix is available.
  • Create a Jira ticket, if you have integrated Jira.
  • Accept the Finding in Risk Acceptance.
  • Runtime image scans include the Image ID. If the image was also scanned in Pipeline or Registry, then you can view it in the Pipeline or Registry Vulnerabilities interface using the 3-dot menu.

  • Cloud Host scans are performed against runtime packages.

  • Use the Image ID to view container images as a first-class citizen in Inventory or the Runtime Vulnerabilities interface from Workloads.

  • With Risk Spotlight enabled you can see which of your vulnerable packages are currently loaded in Runtime.

Configuration Findings Tab

This tab shows you all of your failing Compliance policies for this resource and a breakdown of how many controls failed and passed within each failing policy.

Hover over the results of a failing policy to find out how many controls passed, and how many are failing.

Under Failing Controls, you can see the name of the failing control to be remediated, how many policies and requirements it belongs to, and its severity. The controls are grouped by requirement within each policy.

Hover over the number of policies or requirements to find out their name, and copy them to your clipboard with a click.

Exposure Tab

The Exposure tab shows you if and how a resource is exposed to the Internet.

Select Explore to open a diagram of the different exposure paths. Click on each of the nodes to learn more.

Under Exposure Findings, select a finding to learn about the exposure path in detail. You can discover the resource’s region, when it was last seen, and which platform it is on.

You can also pivot to examining the resource detail drawer for each resource involved in the exposure paths. For instance, if you navigate to an EC2 Instance and view its exposure path, clicking on the Internet Gateway within will overlay a new resource details panel, providing more information about that gateway.

Under Contributing Resources, you can find other resources in the same exposure path. Select any of the resources to open a new Resource Details drawer for them.

Sysdig supports network exposure analysis on the following resource types:

  • Storage accounts and containers: Azure Storage Account and Blob Service containers
  • Storage buckets: AWS S3 Bucket, GCP Cloud Storage Bucket, and Azure Blob Container
  • Serverless functions: AWS Lambda Function, GCP Cloud Function, and Azure Function
  • Compute instances and virtual machines: AWS EC2 Instance, GCP Compute Instance, and Azure VM
  • Network resources: Classic Load Balancer (CLB), Application Load Balancer (ALB), Network Load Balancer (NLB), Security Group, Subnet, Route Table, and Internet Gateway
  • Kubernetes workloads: GKE Deployments and Services exposed via LoadBalancer, Ingress, and Network Policy misconfigurations

These detections use cloud-native constructs such as public IPs, route tables, security groups, access policies, and firewall rules to trace exposure paths. Findings include an evidence chain that explains how each resource became exposed.

Configuration Tab

This tab shows you different “Configurations” detected for the resource, depending on the type:

  • CSPM Resource: Cloud security posture management (CSPM) resource represented in JSON or YAML format.
    • Example: A k8s Deployment Yaml file, or the EC2 Instance description in JSON format.
  • Host resource: List of host-configurations detected at the Linux-Host, or Containers
    • Example: Docker iptables config, or /etc/shadow “password expiration”.
  • IaC Resource: Resources that are read from a Source-Code-Repo show here that actual “Manifest” Yaml/Json that was detected as an Infra-As-Code file
    • Example: A Json representation of the Terraform HCL configuration block for a EC2 Instance.
  • Images: For Images we will show an empty screen.

Packages Tab

Where a resource has packages, this tab displays all the packages Sysdig has identified on the resource, and their paths. You can see how many vulnerabilities each package contains, and context about the vulnerabilities (In Use, Has Exploit, Has Fix).

Select any Package/Path to see more details about it, such as its source, and package type. You can also check whether any update or patch is necessary.

Identity Findings Tab

The Identity Findings tab displays identity-related risks and deviations from best practices associated with the selected IAM resource. Findings are listed in a table with columns for Finding Name and Severity, helping you quickly understand the nature and criticality of any detected issues.

This tab highlights problems such as risky permissions, misconfigurations, or usage anomalies. Select any Finding to open a panel with a detailed description and suggested remediationss to help you resolve the issue.

Use this tab to:

  • Assess the security posture of IAM entities such as users, roles, or service accounts.
  • Prioritize remediation actions based on severity.
  • Track common identity hygiene issues such as access key usage or inactivity.

Connected Resources Tab

The Connected Resources tab shows relationships between the selected IAM entity and other IAM resources. This includes users, groups, roles, or service identities that are connected to the current identity, either directly or through shared permissions or policies.

Use this tab to:

  • Track identity sprawl and assess lateral movement risk.
  • Investigate which other identities might be affected by the same policies or privileges.
  • Pivot to additional identity resources for further inspection.

Data Findings Tab

The Data Findings tab displays information about any sensitive content that has been discovered on a resource. The findings are at the data category level, with Personal, Health, and Financial supported. Click a row with a finding to open the corresponding Data Finding drawer, which shows a summary of the affected resource, a description of the category, and a list of the specific data classes (such as name, SSN, or credit card number) and an example of where in the resource they were seen.

Work with IaC Resources

If you have configured IaC scanning, you can view the resources supported by the Git-integrated scanner in the Inventory, such as YAML, Terraform, and Helm charts. The view of each code resource includes:

  • resource metadata
  • configuration details
  • posture violations that can be remediated with automated workflows.

For more information, see IaC Support.

Inventory currently supports AWS (EC2 Instance) and GCP (Compute Instance) Hosts. Azure VMs are out of scope.

Common Workflows

Explore Resource Types

The goal is to browse available resources and understand your infrastructure composition.

  1. Go to Inventory > Resources with All Resources selected.
  2. Review the table showing all available resource types.
  3. In the left navigation, expand a category you want more information on (for example, Compute).
  4. Select a specific resource type (for example, AWS EC2 Instance).
  5. View the list of resources for the selected type.

Filter resources

The goal is to find resources that match specific criteria.

  1. Select a resource type from the left navigation. Wait for the initial data load to complete.
  2. In the filter bar, select + Add filter.
  3. Choose a field (for example, Name).
  4. Select an operator (for example, In).
  5. Enter one or more values (for example, production-server).
  6. Add additional filters as needed.
  7. Review the filtered results in the table.

Export Data

The goal is to download filtered results for external analysis.

  1. Apply the required filters and sorting.
  2. Select Export from the toolbar. Wait while the export is generated.
  3. Download the report when the export is complete.

Use the Inventory API

Query the Secure API to get a list of multiple inventory resources or retrieve a single one.

  • For details, see the Inventory entries in the API documentation.

  • For API doc links for additional regions or steps to access them from within the Sysdig Secure UI, see the Developer Tools overview.

At this time, only resource metadata and posture data are in scope. Vulnerabilities, package, and exposure data are currently not available.

Inventory Data Dictionary

You can construct searches/filters by attribute name in the Inventory unified filter.

Filter Operators
is (=)
is not (!=)
in (in)
not in (!in)
yes (Y)
no (N)
startsWith (^)
contains (%) (wildcards not supported)
exists/not exists
Attribute NameAttribute Definition
AccountThe container for your AWS resources. You create and manage your AWS resources in an AWS account. If an account has an alias, use the alias to search for the account in Inventory instead of the Account ID.
ArchitectureThe CPU architecture for which your container image is built
ARNThe unique identifier of your AWS cloud resource
Attribute*The attributes defined within the configuration of your Kubernetes host or cluster
* Only filtered from within a Kubernetes host or cluster resource configuration.
Base OSBase operating system of your container image
CategoryClassification or grouping of your resources and services based on their functionalities, characteristics, and use cases.
ClusterName of your Kubernetes cluster
ContainersThe container name(s) of your workload(s)
CreatedDate your container image was created
CVSSThe CVSS score (0.0 - 10.0) of the CVE
External DNSThe DNS name of your Kubernetes host’s node that will resolve into an address with external address characteristics
Git IntegrationName of the Git integration. See IaC Scanning/Git Integrations
Git RepositoryName of the repository, example: IaC_Demo
Has ExploitIf the vulnerability has a known exploit
Has FixIf the vulnerability has a known fix
Host Image IDThe unique identifier associated with a custom or public image used to create and launch your virtual machine instances. Examples:
AWS: ImageID (ex: ami-0123456789abcdef0)
GCP: sourceImage or sourceDisk (ex: projects/canonical-cloud/global/images/family/ubuntu-2004-lts)
Host OSOperating System of your Kubernetes host
Image DigestHash value computed from the content of your container image to verify its integrity (ex: sha256:0278c0…)
Image IDUnique identifier assigned to your container image (ex: sha256:062ab3…)
Image OSThe operating system environment encapsulated within your container image
Image PullstringsThe path where your container image was pulled from in the registry
Image RegistryStorage system where your container is hosted and managed
Image TagsLabels or identifiers associated with your container images (ex: latest, v1.4)
In UseIf the package is running
Kubernetes DistributionGKE, EKS, AKS, Rancher, Vanilla, OpenShift v4, IKS, MKE
LocationPath to the file or module directory in the repository (IaC resources):
- Kubernetes manifest: path to the YAML file
- Helm charts: Helm chart folder
- Kustomize: path to the manifests folder (folder containing the base kustomization.yaml file)
- Terraform: path to the .tf module folder
NamespaceKubernetes cluster namespace
Node TypeMaster or Worker node of your Kubernetes host
OrganizationRoot node of your managed cloud resources hierarchy
Origin*The origin of your Kubernetes host’s or your cluster’s configuration (Docker, Linux, Kubernetes, etc.)
* Only filtered from within a Kubernetes host’s resource configuration..
OS ImageName and version of your host’s Operating System
PackageThe name of a package
Package PathThe file system location or directory path where your software package is stored or installed
Package TypeThe format or structure used to package and distribute your software (ex: Java, OS)
PlatformAWS, Azure, GCP, Kubernetes, or Linux
Posture Accepted RiskWhether or not a risk has been accepted for a resource’s control
Posture Applied PolicyName(s) of the policies applied to the resource
Posture Failed Control SeverityHigh, medium, or low
Posture Failed ControlName(s) of the failed control(s) applied to the resource
Posture Failed PolicyName(s) of the failed policy(ies) applied to the resource
Posture Failed RequirementName(s) of the failed requirement(s) applied to the resource
Posture Passed PolicyName of the passed policy applied to the resource
ProjectThe container for your Google Cloud resources. You create and manage your GCP resources in a GCP project
ExposedIf the resource is publicly or ingress exposed
RegionRegion of the world where your managed cloud resource is deployed (such as us-east, eu-west, asia-northeast)
Resource IDThe unique identifier of your Google or Azure cloud resource
Resource LabelsLabels are key/value pairs, such as team:research, that you have applied to your resource from Kubernetes or Managed Cloud platforms (AWS, GCP, Azure). For Kubernetes, the Labels field includes all the labels for the resource, including nested labels. For example, a search on a label that exists on a container will return the workload that contains the container.
Resource NameName of your resource
Resource Origin- Code: IaC resources from Git integrations
- Deployed: Runtime resources
Resource TypeFor Kubernetes, can be a Workload, Service Account, Role, Cluster Role, Host, User, Cluster, or Group.
For managed clouds, it can be a Resource (S3 bucket, Deployment, DaemonSet…) or an Identity (Access Key, User, Policy…)
Source TypePossible values for IaC source: YAML, Helm, Kustomize, Terraform
SubscriptionThe container for your Azure resources. You create and manage your Azure resources in an Azure subscription
Version/OpenShift Cluster VersionThe version of your OpenShift cluster
VulnerabilityThe CVE identified on your vulnerable package
Vulnerability SeverityThe severity of the CVE
ZonesA business group of resources, defined by a collection of scopes of various resource types (for example: “Dev” - all my development resources)

Technical Background

SysQL Query Engine

Graph Inventory builds queries using SysQL. This graph-based query model enables efficient traversal of resource relationships and supports complex filtering and correlation scenarios across connected entities. The following example illustrates the logical structure of a SysQL query:

MATCH {entity}
WHERE {filters}
RETURN DISTINCT {entity}
ORDER BY {sort}
LIMIT {limit}
OFFSET {offset}

Entity schema

Each resource type defines a schema that specifies:

  • Available fields for filtering.
  • Supported data types (text, number, date, boolean, severity).
  • Supported operators per data type.
  • Display properties such as icons and labels.

Troubleshooting

No Data Displayed

Possible CausesRecommended Action
No graph data sources are connectedSelect + Connect Environment to configure a data source.
The selected entity has no resources in your environmentTry a different entity type or category.
Filters are too restrictiveRemove filters by selecting Reset to basic fields.

Query Timeout

SymptomRecommended Action
An error message indicates that the query exceeded the time limit.
  • Add more specific filters to narrow the result set.
  • Remove complex filters that require expensive graph traversals
  • Contact your administrator if timeouts persist.

Sort Limitation Error

Symptom

A CantSortState error appears when you select a column header.

Cause

Some entity fields do not support server-side sorting.

Sort by a different column, or view results without sorting

Large Result Set Warning

Symptom

A TooLargeResultSetState warning appears with a recommendation to filter results.

Add filters to reduce the number of matching resources before viewing results.