Contents
Analyzing detected vulnerabilities
Kaspersky Container Security detects vulnerabilities through static analysis of registry images, image scans in the runtime and CI/CD objects. For analysis purposes, the full list of detected vulnerabilities is presented as a table in the Investigation → Vulnerabilities section.
The table lists the following for each detected vulnerability:
- The Vulnerability column contains the ID of the vulnerability entry. By clicking on the identifier, you can open a page with detailed information about the vulnerability detected in the image.
- The Severity column displays the severity level of the detected vulnerability and whether it has an exploit.
- The Resource column contains the name of the resource where the vulnerability was detected.
- The Vendor fix column shows whether a fix for the vulnerability is available from the vendor. The solution shows the version number that has the fix, or indicates that no fix is available.
- The Artifacts column shows the number of artifacts (images in registries and the runtime environment, as well as CI/CD objects) that are scanned by Kaspersky Container Security.
The solution displays the number of unique images based on
imagename:tag
for the selected scope. When determining the number of artifacts, the following rules apply:- If an image based on
imagename:tag
is part of the resources of a scope based on resources and clusters, then the image is counted once. - If a user has access to resources of a scope based on clusters, but does not have access to resources based on registries in this scope, only the number of images in the runtime is counted.
- If you specify All in the scopes filter, the total number of artifacts for all scopes is displayed.
- CI/CD artifacts are only countable when working with the default scope.
- If an image based on
- The Workloads column shows the number of pods containing images with the vulnerability.
Using filters, you can select vulnerabilities to display in the table in the Investigation → Vulnerabilities section.
Page topSelecting vulnerabilities to display
To use the filter buttons located above the table to select vulnerabilities to display in the table:
- Click the filter buttons with the values you want to display. Vulnerabilities can be selected based on the following criteria:
- Vulnerabilities by detection location:
- Image in registries.
- Image deployed in a runtime.
- CI/CD object.
- Vulnerabilities by severity level:
- Negligible.
- Low.
- Medium.
- High.
- Critical.
By default, all detection locations and vulnerability severity levels are selected.
- Vulnerabilities by detection location:
- If necessary, use the Disabled / Enabled switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
- If necessary, enter a vulnerability ID or resource name in the search field.
To use a filter to select vulnerabilities to display in the table:
- Click the filter icon (
) above the table with the list of users.
- In the opened sidebar, use the Disabled / Enabled toggle switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
- To determine the severity level, select one of the following options: Severity level or Score, and then do the following:
- If you select Severity level, select the buttons with the values that you want to display. You can select the following display values:
- Negligible.
- Low.
- Medium.
- High.
- Critical.
By default, all vulnerability severity levels are selected.
- If you select Score, use the slider to define the vulnerability score. Values from 0 to 10 are available. The solution will display vulnerabilities that match the specified vulnerability score.
- If you select Severity level, select the buttons with the values that you want to display. You can select the following display values:
- For the Vendor fix setting, specify whether a fix is available from the vendor: All, Available or Not available. The default value is All.
- For the Risk acceptance setting, specify whether the selected vulnerability has been accepted in the specified resource: All, Accepted, or Not accepted. The default value is All.
- For the Location details setting, specify the location where the vulnerability was detected:
- Image in registries.
- Image deployed in a runtime.
- CI/CD object.
By default, all detection locations are selected.
Restrictions related to scopes
The access to the list of detected vulnerabilities is given by scopes assigned to the user as follows.
- If a user is assigned the default scope, the has access to all information about the detected vulnerabilities, including CI/CD objects.
- If the scope assigned to a user entails access to resources based on registries, the user is shown vulnerabilities for which the value of the Workloads column is 0.
- If the scope assigned to a user entails access to resources based on clusters, the user is shown vulnerabilities for which the value of the Workloads column is greater than 0.
- If the scope assigned to a user entails access to resources based on registries and clusters, the user is shown vulnerabilities for which the value of the Workloads column is greater than or equal to 0.