Vulnerability Policies (Image Assurance)

On CloudGuard, findings are created when objects violate GSL rules, as a result of the assessment process as explained in Image Assurance Assessment.

A ruleset is a list of rules that defines what is considered a violation. A ruleset corresponds to a specific KubernetesClosed Kubernetes, often abbreviated as “K8s”, orchestrates containerized applications to run on a cluster of hosts. cluster or an Organization Unit with the use of a Policy configuration.

In addition, Policy Configuration includes the notifications sent when findings are created.

On Image Assurance, everything is configured automatically, so the assessment process is invoked automatically when needed. No user action is required. When you onboard a new cluster to CloudGuard (or enable the Image Assurance feature) and associate it with an Organizational Unit, the cluster obtains the Image Assurance policy configured for this Organizational Unit. If no such policy exists, a new policy is created to associate the new cluster with the default ruleset.

You can assign a new policy or edit an existing one as explained in this section.

Image Assurance policy apples to Kubernetes image assurance, container registries, ECSClosed Amazon Elastic Container Service (ECS) - a fully managed container orchestration service that helps you deploy, manage, and scale Docker containers running applications, services, and batch processes. images and ShiftLeftClosed The ShiftLeft tool scans source code, containers and serverless functions, looking for vulnerabilities including those associated with the Log4j tool. This tool alerts the security and DevOps teams if any vulnerabilities are detected in the pre-build phase, ensuring that vulnerable code is not deployed. image scans.

Image Assurance Default Policy Configuration

Note - This section provides all the details of the default Image Assurance configuration. No user action is required.

To change the default Image Assurance policy or create a new policy, see Getting Started with Image Assurance Policy.

Image Assurance Assessment

During the Image Assurance Assessment process, CloudGuard analyzes image scan results and creates Image Assurance findings. The Image Assurance findings are created in this process for each violation of the Image Assurance rules.

CloudGuard runs the assessment process automatically when the image assurance agents identify an unknown image and scan it. The assessment process runs automatically when you change Image Assurance rulesets and policy, or when you make OU hierarchy changes that have an effect on the association between the Image Assurance policy and your environment. During these events, the assessment process runs on all images applicable to the affected environment.

To see the Image Assurance assessment history of your account, navigate to Workload Protection > Vulnerabilities > Assessment History.