Software Secure Workload
Activity Configure

Container Vulnerability Scanning

To maintain health and identify potential security weaknesses, we recommend scanning the Kubernetes pods regularly.

Prerequisites

Procedure

1

Navigate to Manage > Workloads > Kubernetes.


 

The Clusters tab displays a list of all on-boarded clusters along with the associated inventory, such as services and pods.

2

Click Pod Vulnerability Scanning.

3

To start the scan, enable the toggle under Actions. By default, the toggle is disabled.

4

Click the edit icon to modify the query and select a subset of pods running on the cluster.


 
  • A pod query is populated by default to scan all pod inventories in the cluster. However, you can edit pod queries to select the pods to scan.

  • Currently, scanning Windows container images is not supported.

5

Expand a cluster to view the Health Status Summary.

  • Click on a Kubernetes Node Name to view the Workload Profile.

  • Enable the toggle to automatically download additional information to the host so that the scanner can execute.

Figure 1: Pod Vulnerability Scanning
6

Verify the connection status and enter the credentials, if necessary. The Registry List displays all detected registries.


 

Credentials vary based on the registry type.

Registry Type

Credentials

Azure

Tenant ID, Client ID, Secret Key

AWS

Access Key, Secret Key

GCP

Service account key in JSON format

Other

Username, Password

Troubleshooting

Follow these steps to ensure a successful connection:

  1. The scanner pod is able to connect to the registry.

  2. The required network policies are in place.

  3. Credentials are entered, if necessary.