You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Typically, software in images is added through a package manager, such as apt, yum, npm.
4
-
Prisma Cloud has a diverse set of upstream vulnerability data sources covering many different package managers across operating systems, including coverage for Node, Python, Java, and Ruby components.
5
-
In these cases, Prisma Cloud typically uses the package manager’s metadata to discover the installed components and versions and compares this data to the realtime CVE data feed provided via the intelligence stream.
6
-
However, sometimes you may install software into images without using a package manager, by just having a line in a Dockerfile to ADD the binary to the image or building it via a configure, make, install approach.
3
+
Typically, software is added to container images and hosts with a package manager, such as apt, yum, npm.
4
+
Prisma Cloud has a diverse set of upstream vulnerability data sources covering many different package managers across operating systems, including coverage for Go, Java, Node.js, Python, and, Ruby components.
5
+
Prisma Cloud typically uses the package manager’s metadata to discover installed components and versions, comparing this data to the data in the Intelligence Stream's realtime CVE feed.
6
+
7
+
Sometimes, you might install software without a package manager.
8
+
For example, software might be built from source and then added to an image with the Dockerfile `ADD` instruction.
7
9
In these cases, there is no package manager data associated with the application.
8
10
9
-
Prisma Cloud uses a variety of advanced analysis techniques to detect metadata about software not installed via packages managers.
10
-
This analysis then feeds our existing vulnerability detection and blocking mechanisms, continuing to give you a single view of all the vulnerabilities within a given image, regardless of whether they’re from the distribution layer, an app package manager, or added independently.
11
+
Prisma Cloud uses a variety of analysis techniques to detect metadata about software not installed by packages managers.
12
+
This analysis augments existing vulnerability detection and blocking mechanisms, giving you a single view of all vulnerabilities, regardless of it how the software is installed (distro's package manage, language runtime package manager, or without a package manager).
11
13
12
14
[.section]
13
15
=== Supported apps
14
16
15
-
The following apps are currently supported. But with future requests from customers on additional support this list may be extended.
17
+
The following list shows examples of the apps currently supported.
16
18
19
+
* Kubernetes
20
+
* OpenShift
21
+
* Jenkins
22
+
* Envoy
23
+
* CRIO
24
+
* Hashicorp Vault
25
+
* Hashicorp Consul
26
+
* WordPress
17
27
* Redis
18
28
* Nginx
19
29
* Mongo
@@ -30,8 +40,11 @@ The following apps are currently supported. But with future requests from custom
30
40
Nothing is required to enable the functionality described in this article.
31
41
It is enabled by default.
32
42
33
-
The following screenshot shows what a vulnerability scan report looks like when a vulnerability is discovered in a binary that was not installed into the image with a package manager:
43
+
When vulnerabilities are detected in an unpackaged app, scan repots list the *Type* as *Application*.
0 commit comments