Skip to content

Commit db73be2

Browse files
authored
Document custom vuln matching. (#109)
1 parent 250c70f commit db73be2

File tree

4 files changed

+23
-10
lines changed

4 files changed

+23
-10
lines changed
Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,29 @@
11
== Detect vulnerabilities in unpackaged software
22

3-
Typically, software in images is added through a package manager, such as apt, yum, npm.
4-
Prisma Cloud has a diverse set of upstream vulnerability data sources covering many different package managers across operating systems, including coverage for Node, Python, Java, and Ruby components.
5-
In these cases, Prisma Cloud typically uses the package manager’s metadata to discover the installed components and versions and compares this data to the realtime CVE data feed provided via the intelligence stream.
6-
However, sometimes you may install software into images without using a package manager, by just having a line in a Dockerfile to ADD the binary to the image or building it via a configure, make, install approach.
3+
Typically, software is added to container images and hosts with a package manager, such as apt, yum, npm.
4+
Prisma Cloud has a diverse set of upstream vulnerability data sources covering many different package managers across operating systems, including coverage for Go, Java, Node.js, Python, and, Ruby components.
5+
Prisma Cloud typically uses the package manager’s metadata to discover installed components and versions, comparing this data to the data in the Intelligence Stream's realtime CVE feed.
6+
7+
Sometimes, you might install software without a package manager.
8+
For example, software might be built from source and then added to an image with the Dockerfile `ADD` instruction.
79
In these cases, there is no package manager data associated with the application.
810

9-
Prisma Cloud uses a variety of advanced analysis techniques to detect metadata about software not installed via packages managers.
10-
This analysis then feeds our existing vulnerability detection and blocking mechanisms, continuing to give you a single view of all the vulnerabilities within a given image, regardless of whether they’re from the distribution layer, an app package manager, or added independently.
11+
Prisma Cloud uses a variety of analysis techniques to detect metadata about software not installed by packages managers.
12+
This analysis augments existing vulnerability detection and blocking mechanisms, giving you a single view of all vulnerabilities, regardless of it how the software is installed (distro's package manage, language runtime package manager, or without a package manager).
1113

1214
[.section]
1315
=== Supported apps
1416

15-
The following apps are currently supported. But with future requests from customers on additional support this list may be extended.
17+
The following list shows examples of the apps currently supported.
1618

19+
* Kubernetes
20+
* OpenShift
21+
* Jenkins
22+
* Envoy
23+
* CRIO
24+
* Hashicorp Vault
25+
* Hashicorp Consul
26+
* WordPress
1727
* Redis
1828
* Nginx
1929
* Mongo
@@ -30,8 +40,11 @@ The following apps are currently supported. But with future requests from custom
3040
Nothing is required to enable the functionality described in this article.
3141
It is enabled by default.
3242

33-
The following screenshot shows what a vulnerability scan report looks like when a vulnerability is discovered in a binary that was not installed into the image with a package manager:
43+
When vulnerabilities are detected in an unpackaged app, scan repots list the *Type* as *Application*.
44+
45+
image::unpackaged-sw-app-vulns.png[width=750]
3446

35-
image::detect_vulns_unpackaged_software_730511.png[width=800]
47+
Vulnerabilities of typei *Application* are carried in the Intelligence Stream's *app* feed.
48+
Go to the CVE statistics section on the *Manage > System > Intelligence* page for more information.
3649

37-
Customers can open support tickets to request support for additional binaries apart from those aforementioned.
50+
image::unpackaged-sw-cve-stats.png[width=750]
Loading
Loading

0 commit comments

Comments
 (0)