Examining Images for Vulnerabilities
Alauda Container Security for Kubernetes enables you to analyze container images for vulnerabilities using the built-in Scanner V4. The scanner inspects image layers, identifies packages, and matches them against vulnerability databases from sources like NVD, OSV, and OS-specific feeds.
When vulnerabilities are detected, Alauda Container Security:
- Displays them in the Vulnerability Management view
- Ranks and highlights them for risk assessment
- Checks them against enabled security policies
The scanner identifies installed components by inspecting specific files. If these files are missing, some vulnerabilities may not be detected. Required files include:
TOC
Scanner V4 Overview
Scanner V4 enhances scanning for language and OS-specific components. Scanner V4 is enabled by default and is required for all vulnerability scanning scenarios.
Scanner Workflow
Workflow Steps
- Central requests Scanner V4 Indexer to analyze images.
- Indexer pulls metadata and downloads layers.
- Indexer produces an index report.
- Matcher matches images to vulnerabilities and generates reports.
Common Scanner Warning Messages
Supported Platforms and Formats
Supported Linux Distributions
Some older Debian/Ubuntu versions are not updated by the vendor. Fedora is not supported for OS CVEs.
Supported Package Formats
Supported Programming Languages
Supported Container Image Layer Formats
Image Scanning and Watch List
Alauda Container Security scans all active images every 4 hours. You can also enable automatic scanning of inactive images (from version 3.0.57) via the Watch setting.
Steps:
- In the portal, go to Vulnerability Management > Results.
- Click More Views > Inactive images.
- Click Manage watched images and add or remove images as needed.
Data for removed images is retained for the configured period in System Configuration.
Vulnerability Data Updates
Central fetches vulnerability definitions every 5 minutes from https://definitions.stackrox.io