Project

Profile

Help

Story #6871

closed

[Epic] Add security scanner integration

Added by bmbouter almost 4 years ago. Updated over 2 years ago.

Status:
CLOSED - DUPLICATE
Priority:
Normal
Assignee:
-
Sprint/Milestone:
-
Start date:
Due date:
% Done:

0%

Estimated time:
Platform Release:
Groomed:
No
Sprint Candidate:
No
Tags:
Sprint:
Quarter:

Description

Ticket moved to GitHub: "pulp/pulp_container/463":https://github.com/pulp/pulp_container/issues/463


Goal

Users storing content in pulp_container should derive benefit from security scanning of docker containers that are out there.

Existing Tools

The idea is to integrate a tool not make a new one. Here are some options I've read about from this article.

Actions #1

Updated by westurner over 3 years ago

Would this be implemented as a webhook (e.g. to an existing CI system) or as a celery task?

Where would the report artifacts be saved?

Actions #2

Updated by westurner over 3 years ago

What are the least possible privileges for a celery task? (A task that runs one or more container analysis tools and saves the report artifacts(s) somewhere)

Actions #3

Updated by westurner over 3 years ago

https://github.com/goharbor/pluggable-scanner-spec :

Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.

Add support to Harbor for using other image scanners than just Clair by replacing the current Clair-specific scanning job implementation with an adapter layer implemented as an HTTP API between Harbor and the scanners' native interfaces. This will provide runtime configurable scanner invocation to provide vulnerability scanning initially with the option for other types of scanning in the future.

https://github.com/goharbor/harbor-scanner-clair

Actions #4

Updated by westurner over 3 years ago

"Automated Compliance Tooling (ACT)" https://www.linuxfoundation.org/press-release/2019/12/the-linux-foundations-automated-compliance-work-garners-new-funding-advances-tools-development/

  • https://github.com/tern-tools/tern :

    Tern is an inspection tool to find the metadata of the packages installed in a container image

    • https://github.com/tern-tools/tern#cve-bin-tool :

      cve-bin-tool is a command line tool which "scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities". Vulnerability scanning tools can also be extended to work on containers using Tern, although support for certain metadata pertaining to CVEs may not be available yet.

... "DevSecOps"

Actions #5

Updated by westurner over 3 years ago

("DOC,SEC: Docker Notary / TUF support" #7419 could also be tagged 'security' if there was such an issue tag)

Actions #6

Updated by pulpbot over 2 years ago

  • Description updated (diff)
  • Status changed from NEW to CLOSED - DUPLICATE

Also available in: Atom PDF