You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/security-pod-scan-cso-using.adoc
+4-10Lines changed: 4 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -14,21 +14,15 @@ The following procedure shows you how to use the {rhq-cso}.
14
14
15
15
.Procedure
16
16
17
-
. On the {product-title} web console, navigate to *Home*->*Overview*. Under the *Status* section, *Quay Image Security* provides the number of vulnerabilities found.
17
+
. On the {product-title} web console, navigate to *Home*->*Overview*. Under the *Status* section, *Image Vulnerabilities* provides the number of vulnerabilities found.
18
18
19
-
. Click *Quay Image Security* to reveal the *Quay Image Security breakdown*, which details the severity of the vulnerabilities, whether the vulnerabilities can be fixed, and the total number of vulnerabilities. For example:
20
-
+
21
-
image:image_security.png[Access image scanning data from {product-title} dashboard]
19
+
. Click *Image Vulnerabilities* to reveal the *Image Vulnerabilities breakdown* tab, which details the severity of the vulnerabilities, whether the vulnerabilities can be fixed, and the total number of vulnerabilities.
22
20
23
21
. You can address detected vulnerabilities in one of two ways:
24
22
+
25
-
.. Select the link to the vulnerability. This takes you to the container registry that the container came from, where you can see information about the vulnerability. The following example shows detected vulnerabilities from a Quay.io registry:
26
-
+
27
-
image:cso-registry-vulnerable.png[The {rhq-cso} points you to a registry containing the vulnerable image]
23
+
.. Select a link under the *Vulnerabilities* section. This takes you to the container registry that the container came from, where you can see information about the vulnerability.
28
24
29
-
.. Select the *namespace* link. This takes you to the *ImageManifestVuln* page, where you can see the name of the selected image and all of the namespaces where that image is running. For example, the following image shows you that a particular vulnerable image is running in the `quay-enterprise` namespace:
30
-
+
31
-
image:cso-namespace-vulnerable.png[View namespaces a vulnerable image is running in]
25
+
.. Select the *namespace* link. This takes you to the *Image Manifest Vulnerabilities* page, where you can see the name of the selected image and all of the namespaces where that image is running.
32
26
33
27
. After you have learned what images are vulnerable, how to fix those vulnerabilities, and the namespaces that the images are being run in, you can improve security by performing the following actions:
0 commit comments