Introduction

Security vulnerabilities can be exploited to cause denial of service, remote code execution, privilege escalation, or unauthorized access to sensitive data. Effective vulnerability management is therefore a core part of operating a secure Kubernetes environment.

In Alauda Security Service, vulnerability workflows are centered on:

  • Results for day-to-day triage
  • Exception Management for deferred and false-positive requests
  • Vulnerability Reporting for scheduled and downloadable reports