Skip to content

Commit 928755c

Browse files
authored
Doc support for AWS Lambda Layers (#111)
Show how to see vulnerabilities in layers.
1 parent db73be2 commit 928755c

10 files changed

+84
-10
lines changed
Loading
Loading
Loading
Loading

admin_guide/compliance/serverless.adoc

Lines changed: 42 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -148,16 +148,55 @@ Console dynamically selects an available Defender to execute the scan job.
148148

149149
.. Specify a function name or pattern.
150150
+
151-
Wildcards are supported.
151+
NOTE: Wildcards are supported.
152152

153153
.. Select or xref:../authentication/credentials_store.adoc[create credentials] so that Prisma Cloud can access your account.
154154

155155
.. Specify a cap for the number of functions to scan.
156156
+
157-
Prisma Cloud scans the X most recent functions, where X is the cap value. To scan all functions, set the cap to 0.
157+
NOTE: Prisma Cloud scans the X most recent functions, where X is the cap value. To scan all functions, set the cap to 0.
158158

159+
.. Select *Scan only latest versions* to only scan the latest version of each function. Otherwise, the scanning will cover all versions of each function up to the specified *cap* value.
160+
161+
.. Select *Scan Lambda Layers* to enable scanning the function's Layers as well.
162+
159163
.. Click *Add*.
160164

161-
. Click the save button.
165+
. Click the *Save* button.
162166

163167
. To view the scan report, go to *Monitor > Compliance > Functions*.
168+
169+
=== View AWS Lambda Layers scan report
170+
171+
Prisma Cloud can scan the AWS Lambda Layers code as part of the Lambda function's code scanning.
172+
This capability can help you determine whether the Compliance checks are associated with the function or function Layers.
173+
Follow the steps below to view the Lambda Layers compliance scan results:
174+
175+
[.procedure]
176+
. Open Console.
177+
178+
. Make sure you selected the *Scan Lambda layers* in the Defend > Compliance > Functions > Functions > Serverless Accounts > *Function scan scope*
179+
+
180+
image::function_scan_scope.png[width=700]
181+
182+
. Go to *Monitor > Compliance > Functions > Scanned functions*.
183+
184+
. Filter the table to include functions with the desired Layer by adding the *Layers* filter.
185+
+
186+
You can also filter the results by a specific layer name or postfix wildcards.
187+
Example: `Layers:* OR Layers:arn:aws:lambda:*`
188+
+
189+
image::comp_layers_filter.png[width=700]
190+
191+
. Open the *Function details* dialog to view the details about the Layers and the Compliance issues associated with them:
192+
193+
.. Click on a specific function
194+
195+
.. See the Function's vulnerabilities, compliance issues and package info in the related tabs. Use the *Found in* column to determine if the component is associated with the Function or with the Function's Layers.
196+
+
197+
image::comp_function_details.png[width=700]
198+
199+
.. Use the *Layers info* tab to see the full list of the function's the Layers.
200+
+
201+
image::vuls_functions_layers_info.png[width=700]
202+
Loading
Loading
Loading
Loading

admin_guide/vulnerability_management/serverless_functions.adoc

Lines changed: 42 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Unlike image scanning, all function scanning is handled by Console.
4545
.. Specify a function name.
4646
+
4747
NOTE: Wildcards are supported.
48-
+
48+
4949
.. Select or xref:../authentication/credentials_store.adoc[create credentials] so that Prisma Cloud can access your account.
5050
+
5151
* AWS -- Specify either an IAM user credential (access key ID and secret access key) or IAM role.
@@ -55,19 +55,54 @@ NOTE: Wildcards are supported.
5555
.. Specify a cap for the number of functions to scan.
5656
+
5757
NOTE: Prisma Cloud scans the X most recent functions, where X is the cap value. Set this value to `0` to scan all functions.
58-
+
58+
5959
.. Select *Scan only latest versions* to only scan the latest version of each function. Otherwise, the scanning will cover all versions of each function up to the specified *cap* value.
60-
+
60+
61+
.. Select *Scan Lambda Layers* to enable scanning the function's Layers as well.
62+
6163
.. Click *Add*.
6264

63-
. Click the yellow save button.
64-
+
65-
image::save_button.png[width=50]
65+
. Click the *Save* button.
6666

6767
. View the scan report.
6868
Go to *Monitor > Vulnerabilities > Functions > Scanned functions*.
6969

7070

71+
=== View AWS Lambda Layers scan report
72+
73+
Prisma Cloud can scan the AWS Lambda Layers code as part of the Lambda function's code scanning.
74+
This capability can help you determine whether the vulnerability issues are associated with the function or function Layers.
75+
Follow the steps below to view the Lambda Layers scan results:
76+
77+
[.procedure]
78+
. Open Console.
79+
80+
. Make sure you selected the *Scan Lambda layers* in the Defend > Vulnerabilities > Functions > Functions > Serverless Accounts > *Function scan scope*
81+
+
82+
image::function_scan_scope.png[width=700]
83+
84+
. Go to *Monitor > Vulnerabilities > Functions > Scanned functions*.
85+
86+
. Filter the table to include functions with the desired Layer by adding the *Layers* filter.
87+
+
88+
You can also filter the results by a specific layer name or postfix wildcards.
89+
Example: `Layers:* OR Layers:arn:aws:lambda:*`
90+
+
91+
image::function_vuls_layers_filter.png[width=700]
92+
93+
. Open the *Function details* dialog to view the details about the Layers and the vulnerabilities associated with them:
94+
95+
.. Click on a specific function
96+
97+
.. See the Function's vulnerabilities, compliance issues and package info in the related tabs. Use the *Found in* column to determine if the component is associated with the Function or with the Function's Layers.
98+
+
99+
image::vul_function_details.png[width=700]
100+
101+
.. Use the *Layers info* tab to see the full list of the Function's Layers, and aggregated information about the Layers vulnerabilities. In case that there are vulnerabilities associated with the layer you will be able to expand the layer raw to list all the vulnerabilities.
102+
+
103+
image::vuls_functions_layers_info.png[width=700]
104+
105+
71106
=== Authenticating with AWS
72107

73108
The serverless scanner is implemented as part of Console.
@@ -95,7 +130,7 @@ endif::prisma_cloud[]
95130
[.task]
96131
=== Scanning Azure Functions
97132

98-
Azure Functions are architected differently than AWS Lambda and Google Cloud Functions.
133+
Azure Functions are architected differently than AWS Lambda and Google Cloud Functions.
99134
Azure function apps can hold multiple functions.
100135
The functions are not segregated from each other.
101136
They share the same file system.

0 commit comments

Comments
 (0)