As an Amazon Associate I earn from qualifying purchases from

What’s Container Scanning (And Why You Want It)

I need to share my expertise utilizing vulnerability scanners and different open-source initiatives for safetyIaC conf information earlier than launch or deployment.

How does it work?

Scanners pull the picture from the docker registry and attempt to analyze every layer. After the primary working, scanners will obtain their vulnerability database.  Then every time after working, the group (safety specialist, distributors, and so forth.) identifies, defines, and provides publicly disclosed cybersecurity vulnerabilities to the catalog. We have to contemplate that generally if you run some scanners in your server or laptop computer, scanners can take a while to replace their database.  

Often, scanners and different safety instruments use a number of assets for his or her database: 

Consequently, we see the output with an inventory of vulnerabilities, title of parts or libraries, Vulnerability ID, Severity degree (Unknown, Negligible, Low, Medium, Excessive), and Software program Invoice of Supplies (SBOM) format. Utilizing output, we will see or write in a file by which bundle model vulnerabilities have been fastened. This data may also help change/replace packages or base the picture on the safe one. 

open supply

Trivy Grype


Grype outputA part of the Grype output


Trivy outputA part of the Trivy output

A pair benefits of Trivy is that 1) it could possibly scan Terraform conf information, and a couple of) it’s output format (by default as a desk output) is best because of coloured output and desk cells summary with hyperlink to whole vulnerabilities description.

Each initiatives can write output in JSON and XML utilizing templates. That is useful in integrating scanners in CI/CD, or utilizing the report for one more customized workflow. Nevertheless, data from Trivy seems extra informative as a result of vulnerability summary and additional hyperlinks with descriptions.

Trivy output JSONA part of Trivy output JSON

Further options

  • You’ll be able to scan personal photos and ​self-hosted container registries.
  • Filtering vulnerabilities is a characteristic for each initiatives. Filtering may also help spotlight essential points or discover particular vulnerabilities by ID. Within the newest case the place many safety specialists, DevOps looking CVE-2021–44228 (Log4j) related with a typical Java logging library, that may also be reused in lots of different initiatives.
  • You’ll be able to combine vulnerabilities scanners in Kubernetes
  • Trivy kubectl plugin permits scan photos working in a Kubernetes pod or deployment.


There’s a instrument for detection and administration of Software program Invoice Of Supplies (SBOM) and vulnerabilities referred to as KubeClarity. It scans each runtime K8s clusters and CI/CD pipelines for enhanced software program provide chain safety.

KubeClarity vulnerability scanner integrates with the scanners Grype (that we noticed above) and Dependency-Monitor.

KubeClarity dashboardKubeClarity Dashboard


KubeClarity dashboard 2KubeClarity Dashboard

Based mostly on my expertise, I noticed these benefits in KubeClarity:

  • Helpful Graphical Consumer Interface
  • Filtering options capabilities:
    • Packages by license sort
    • Packages by title, model, language, utility assets
    • Severity by degree (Unknown, Negligible, Low, Medium, Excessive)
    • Repair Model

What’s subsequent?

I can counsel Studying Monitor Container Introduction to containers and container administration in case you are new to this. In the event you already work with containers, and open-source initiatives, select a associated scanner and use it on your venture. If you have already got a Kubernetes cluster, you’ll be able to simply set up KubeClarity in a K8s cluster utilizing Helm, and make KubeClarity UI seen utilizing port-forward and LoadBalancer for the kubeclarity-kubeclarity service.


We’d love to listen to what you suppose. Ask a query or go away a remark under.
And keep related with Cisco DevNet on social!

LinkedIn | Twitter @CiscoDevNet | Fb | Developer Video Channel


We will be happy to hear your thoughts

Leave a reply

Enable registration in settings - general
Compare items
  • Total (0)
Shopping cart