Qualys TotalCloud 2.23.0 Release Updates

Shrikant Dhanawade

The Qualys TotalCloud™ 2.23.0 version introduces new capabilities, features, and updates. The release is expected to be available by mid-April 2026.

CWPP Enhancements

GCP Internal Scan

Qualys TotalCloud and Qualys VMDR now support internal network scanning for GCP Cloud Virtual Machines, using the Qualys Virtual Scanner Appliance deployed directly within your VPC. Unlike legacy IP-based scans that struggle with ever-changing address patterns, this approach targets GCP instances by instance ID, ensuring the right workloads are consistently identified and scanned, regardless of how their private IPs change over time.

This brings deep, localized vulnerability management to the parts of your cloud environment that matter most. Security teams gain accurate, inside-the-network visibility into GCP workloads without exposing them to external scan traffic, ensuring that internal exposures and misconfigurations are surfaced before they can be exploited.

CSPM Enhancements

Schedule Reports and Notification

TotalCloud has extended CSPM Reporting to include scheduling and notification functionality. Security teams can configure automated, periodic reports daily, weekly, monthly, or create custom schedules scoped precisely to their cloud accounts and environments, delivered directly to custom recipient lists without any manual intervention.

By offering timely compliance snapshots, every stakeholder gets the right information at the right cadence.

Inventory of IaC Code with co-related misconfigurations

Misconfigurations don’t just originate in the cloud; they also originate in code. TotalCloud now collects the IaC code inventory from GitHub repositories and correlates it with IaC misconfigurations detected via your existing scan integrations. We now show you cloud inventory (right side) and code inventory (left side) in the same place.

aC Code Inventory

Updates to CIS Version  

We have updated our CSPM policy library for the CIS Foundations Benchmarks to ensure your compliance assessments align with the latest industry standards and security best practices.  

The updated support now includes:

  • CIS Amazon Web Services Foundations Benchmark v6.0.0
  • CIS Microsoft Azure Foundation Benchmark v5.0.0
  • CIS Google Cloud Platform Foundation Benchmark v4.0.0

Key Benefits:

  • Latest Security Standards: Incorporates updated recommendations to address evolving threats and compliance requirements. 
  • Improved Accuracy & Coverage: Reflects recent cloud provider changes for more precise risk assessments and fewer false positives. 

Detection of Deleted Resources

Security teams need to know not just what exists in their cloud environment, but what no longer does. TotalCloud now tracks and displays deleted cloud resources alongside active ones, giving teams a complete lifecycle view — when a resource existed, when it was removed, and what risks it carried while it was live. This eliminates false-positive alerts on stale assets and keeps your inventory grounded in reality.

To support faster investigation, two new QQL tokens are now available across the inventory and posture tabs:

TokenWhat it does
Not discovered (Last 7 days)Filters resources that haven’t been seen in the last 7 days, helping surface assets that may have gone dark
Deleted resourcesFilters confirmed deleted resources, with a clear notation on both inventory and posture tabs for quick identification

Inventory Expansion

TotalCloud now extends its inventory coverage across cloud, network, and AI resources — giving security teams a more complete and accurate foundation for posture assessment and risk analysis.

InventoryWhat ChangedKey Benefits
GCP Load BalancerWe have revamped the GCP Load Balancer resource listing to surface the right resources precisely, including Load Balancing Forwarding Rules.

Beyond improved inventory visibility, this enhancement directly strengthens attack path analysis, ensuring that network-level resources are accurately factored into the identification and evaluation of potential attack routes.
Complete network resource visibility, including Forwarding Rules

More reliable attack path analysis with no gaps in network coverage

Cleaner inventory with no phantom or missing entries  
Increased coverage for AI InventoryAs enterprises rapidly adopt AI services, the infrastructure powering those workloads, agents, models, and pipelines is becoming a significant and often ungoverned part of the cloud attack surface.

TotalCloud now extends inventory coverage to include AWS Bedrock Agents and Azure AI Foundry Agents, bringing AI resources under the same unified visibility and security assessment framework as the rest of your cloud environment.
Broader coverage of AI agents across AWS and Azure

No blind spots as AI adoption outpaces traditional governance

Consistent security posture across all cloud resource types  
Removed Bedrock Foundational Models – AWS Managed ModelsA precise inventory is only valuable when it reflects resources that your team owns and controls. AWS Bedrock Foundational Models are fully managed by AWS; their presence in TotalCloud’s inventory was introducing noise, inflating resource counts.

By removing these AWS-managed models from the inventory, TotalCloud delivers a cleaner, more accurate view of your cloud estate, ensuring that every resource surfaced is one your team is accountable for, and that reporting reflects a true picture of your security posture without distortion.
Accurate resource counts reflecting only what your team owns

Cleaner posture reporting with no AWS-managed noise

Faster, more focused security reviews  
Smarter Azure VM Discovery – Excluding Managed Service-Generated VMs from Scans  When Azure managed services like Databricks spin up background VMs to power their compute workloads, those VMs surface in your cloud inventory, consuming valuable scan licenses and inflating costs without adding security value.

TotalCloud now intelligently identifies these managed service-generated VMs using key fingerprinting fields such as “Source Image Publisher” and “Source Image Offer,” and excludes them from VM scans by default. This means more accurate posture metrics and leaner operational costs, without any manual filtering overhead.
Scan licenses used only on VMs your team manages

Posture metrics that reflect real security coverage

Lower operational costs with zero manual overhead

 

CSPM Control Enhancements

New Controls and Title Updates

We continuously monitor new security controls across cloud platforms. In this release, we have added approximately 11 new security controls for AWS IaC checks, 15 for Azure runtime checks, and several for GCP and OCI. We have also refreshed the control titles for a few AWS and OCI controls to align with the latest security checks.

For ongoing updates on these control changes, refer to the TotalCloud Release Notes for version 2.23, which will be published soon on the Qualys Product Release Notes page.

Deprecated Controls

When cloud providers deprecate specific services or features, the corresponding Qualys CSPM controls are also deprecated to maintain alignment. This ensures your compliance posture accurately reflects the current state of your cloud environments, eliminating outdated or irrelevant findings.

For more information on impacted controls, refer to the control metadata forAWS | Azure | GCP | OCI

Cloud PlatformDeprecated ControlsReason for Deprecation
AWS602 – Ensure Amazon OpenSearch Service domains should have fine-grained access control enabledSimilar checks are available in other control CID 495

CDR Enhancements

Group by QLP in CDR Investigate

The Investigate details now support grouping detections by Qualys Locator Path (QLP), giving security teams a faster, more structured way to triage threats across their cloud environment. Qualys Locator Path (QLP) is a hierarchical, intuitive grouping framework that organizes Kubernetes containers based on their logical placement within the environment. Rather than sifting through a flat list of detections, teams can now organize findings by Cluster QLP or Container QLP, surfacing patterns and risk concentrations at a glance.

This release extends QLP grouping to container-native security contexts. CDR now supports QLP grouping dimensions, meaning detections can be traced and clustered across the full container hierarchy, from the cluster level down to the individual pod and container. Teams investigating active threats can immediately understand which part of the container stack is affected, reducing triage time and making remediation more targeted.

Hide Excepted Events

When reviewing events captured by the CDR appliance or Network Flow Logs, you can leverage exceptions to hide specific events that are known, expected, or non-actionable, reducing noise without permanently deleting any data.

CDR now lets you suppress unwanted or irrelevant events in the Investigate UI, keeping your security view focused on what matters most. This ensures your team can prioritize genuine threats while maintaining a complete and auditable record of all activity.

MITRE Mapping for All Events

TotalCloud CDR now extends MITRE ATT&CK mapping across all captured events, whether sourced from the Threat Scanner, Network Flow Logs, or the eBPF runtime. Every event is now enriched with the corresponding MITRE techniques and tactics, giving your security team a standardized, framework-aligned view of threats.

This makes it easier to understand attacker behavior, correlate events across sources, and prioritize response efforts with greater confidence.

CDR Investigate Tab

What’s Next

If you have any questions, please contact your Technical Account Manager (TAM) or Qualys Technical Support.

Share your Comments

Comments

Your email address will not be published. Required fields are marked *