Viewing and Addressing Vulnerabilities
Alauda Container Security provides comprehensive tools for discovering, viewing, prioritizing, and addressing vulnerabilities in your container and cluster environments. This document describes how to use the platform to manage vulnerabilities efficiently and securely.
TOC
Overview of Vulnerability Management
Alauda Container Security enables you to:
- Identify vulnerabilities in workloads, platform components, and nodes
- Filter and prioritize vulnerabilities based on risk
- Take action through remediation, deferral, or exception management
- Export vulnerability data for further analysis
Navigating Vulnerability Views
Vulnerability data is organized into several main views, accessible from Vulnerability Management > Results:
- User workloads: Vulnerabilities in workloads and images you have deployed
- Platform: Vulnerabilities in platform components (e.g., Alauda Container Platform and layered services)
- Nodes: Vulnerabilities across all nodes
- More views: Additional perspectives, such as all vulnerable images, inactive images, images without CVEs, and Kubernetes components
User Workload Vulnerabilities
View and filter vulnerabilities in your deployed workloads and images.
How to View User Workload Vulnerabilities
- Go to Vulnerability Management > Results.
- Select the User Workloads tab.
- Use the Observed, Deferred, or False positives tabs to filter by vulnerability status.
- Refine results by namespace, severity, or other filters as needed.
- Use the filter bar to search by entity (e.g., CVE, image, deployment).
Note
The Filtered view icon indicates that results are filtered. Click Clear filters to remove all filters, or remove individual filters by clicking them.
User Workload Filter Options
Entity | Attributes |
---|
Image | Name; Operating system; Tag; Label; Registry |
CVE | Name; Discovered time; CVSS; EPSS probability |
Image Component | Name; Source (OS, Python, Java, Ruby, Node.js, Go, Dotnet Core Runtime, Infrastructure); Version |
Deployment | Name; Label; Annotation; Status |
Namespace | ID; Name; Label; Annotation |
Cluster | ID; Name; Label; Type; Platform type |
| CVE severity; CVE status |
Platform Vulnerabilities
View vulnerabilities in platform components and layered services.
How to View Platform Vulnerabilities
- Go to Vulnerability Management > Results.
- Select the Platform tab.
- Use the Observed, Deferred, or False positives tabs as needed.
- Refine results by namespace, severity, or other filters.
- Use the filter bar to search by entity.
Platform Filter Options
Entity | Attributes |
---|
Image | Name; Operating system; Tag; Label; Registry |
CVE | Name; Discovered time; CVSS; EPSS probability |
Image Component | Name; Source; Version |
Deployment | Name; Label; Annotation; Status |
Namespace | ID; Name; Label; Annotation |
Cluster | ID; Name; Label; Type; Platform type |
| CVE severity; CVE status |
Node Vulnerabilities
View vulnerabilities across all nodes in your environment.
How to View Node Vulnerabilities
- Go to Vulnerability Management > Results.
- Select the Nodes tab.
- Optionally, click Show snoozed CVEs.
- Use filters to narrow down by node, CVE, component, or cluster.
Node Filter Options
Entity | Attributes |
---|
Node | Name; Operating system; Label; Annotation; Scan time |
CVE | Name; Discovered time; CVSS |
Node Component | Name; Version |
Cluster | ID; Name; Label; Type; Platform type |
More Views
Access additional perspectives on vulnerabilities:
- All vulnerable images: See all images with vulnerabilities
- Inactive images: View vulnerabilities in watched or inactive images
- Images without CVEs: Identify images with no detected vulnerabilities
- Kubernetes components: View vulnerabilities in the underlying Kubernetes structure
How to Use More Views
- Go to Vulnerability Management > Results.
- Click More Views and select the desired view.
- Use available filters and columns to organize and analyze the data.
Exception Management
Exception management allows you to snooze, defer, or mark CVEs as false positives, tailoring vulnerability management to your organization's needs.
Snoozing CVEs
Temporarily ignore a CVE for a specified period. Snoozed CVEs do not appear in reports or trigger policy violations.
Steps to Snooze/Unsnooze CVEs
- Go to Vulnerability Management > Platform CVEs or Node CVEs.
- Select CVEs and use the overflow menu or bulk actions to snooze or unsnooze.
- Choose the duration and confirm.
Marking CVEs as False Positives
Mark a CVE as a false positive globally or for specific images. Requires approval.
Steps to Mark as False Positive
- Go to Vulnerability Management > Results > User Workloads.
- Select CVEs and use the overflow menu or bulk actions.
- Enter a rationale and submit the request.
Deferring CVEs
Defer a CVE, accepting the risk for a specified period. Requires approval.
Steps to Defer CVEs
- Go to Vulnerability Management > Results > User Workloads.
- Select CVEs and use the overflow menu or bulk actions.
- Choose the deferral period, enter a rationale, and submit.
Managing Exception Requests
Review, approve, deny, update, or cancel exception requests in Vulnerability Management > Exception Management.
Viewing Deferred and False Positive CVEs
In User Workloads, use the Deferred or False positives tabs to view relevant CVEs.
Identifying and Remediating Vulnerabilities
Identifying Vulnerable Dockerfile Lines
Alauda Container Security can show which Dockerfile line introduced a vulnerable component.
Steps
- Go to Vulnerability Management > Results > User Workloads.
- Click a CVE to view details and expand to see the affected Dockerfile line.
Upgrading Components
Find and upgrade to a fixed version of a vulnerable component.
Steps
- Go to Vulnerability Management > Results > User Workloads > Images.
- Select an image and expand the CVE to see the fixed version.
- Update your image accordingly.
Exporting Vulnerability Data
Export vulnerability data for further analysis or reporting using the API.
How to Export via API
- Use the
/v1/export/vuln-mgmt/workloads
streaming API.
- Output is JSON, each line contains a deployment and its images.
Example
curl -H "Authorization: Bearer $ROX_API_TOKEN" $ROX_ENDPOINT/v1/export/vuln-mgmt/workloads
Best Practices
- Use filters and exception management to focus on relevant vulnerabilities.
- Regularly review deferred and false positive CVEs.
- Integrate exported data with external tools for compliance and reporting.
- Keep Alauda Container Security and scanners up to date.
Summary
Alauda Container Security provides a robust platform for vulnerability discovery, prioritization, remediation, exception management, and data export. By following the structured procedures and best practices in this document, you can effectively manage container and cluster security risks in your environment.