Patching Image Vulnerabilities with Kubescape & Copa
In this article, we’ll learn how can we patch vulnerabilities in our container images using Kubescape & Copa.
In this article, we’ll learn how can we patch vulnerabilities in our container images using Kubescape & Copa.
Vulnerability Exploitability eXchange (VEX) is a vulnerability document designed to complement a Software Bill of Materials (SBOM). It informs users of a software product about the applicability of one or more vulnerability findings.
Security scanners will detect and flag components in software that have been identified as being vulnerable. Often, software is not necessarily affected as signaled by security scanners for many reasons.
For example:
The vulnerable component may have been already patched,
The vulnerable component may not be present
The vulnerable code is not actually executed.
The extreme transparency brought by SBOMs into how software is composed will most likely increase the number of these kinds of false positives, requiring an automated solution to avoid an explosion in the false positive rate of security scans. Hence VEX.
Using VEX is a way to turn down the noise, and give security practitioners a good strong signal, a scanner may consume VEX data from the software supplier. However, it is time-consuming to write a VEX document and since it is imperative these documents stay current, it is a never ending task. The solution to this must come via automation.
Kubescape 3.0 is laden with new functionality. In this blog post, we will introduce you to two new and complementary features.
The new Capabilities system
The Continuous Scanning feature
Watch a short video for a demonstration of these features in action, or read on.
Kubescape 3.0 introduces workload scanning, which allows you to comprehensively report on the security posture of individual workloads running in a Kubernetes cluster. This includes both misconfiguration and vulnerability scanning. This scan results in information that gives a 360° assessment of your workload’s security posture.
Watch a short video for a demonstration of workload scanning and its benefits, or read on.
In previous versions, Kubescape supported vulnerability scanning inside a cluster. We’ve brought this feature to the Kubescape command line in 3.0.
Watch a short video for a demonstration of image scanning from the Kubescape CLI and its benefits, or read on.
In the latest release of Kubescape, we completely overhauled the CLI experience to make it easier and faster for you to improve the security of your clusters.
Watch a short video for a demonstration of the new CLI and its benefits, or read on.
We are excited to announce the preview release of Kubescape 3.0, the next generation of the CNCF Kubernetes security posture management tool.
Kubescape 3.0 will add:
Most of these features have landed already, with some being finished over the next few weeks.
What do you get a piece of software for its second birthday? A brand-new blog, of course! And cake. More on the cake later.
Kubescape is an open-source Kubernetes security platform that helps you identify and fix security risks, misconfigurations and vulnerabilities in your Kubernetes clusters. It is a powerful tool that can save you time and effort, and help you keep your Kubernetes deployments secure.