Scanning & Compliance
SUSE® Security enables full lifecycle scanning & compliance through vulnerability scanning and running of the CIS benchmarks for security, as well as custom compliance checks. The Security Risks menu enables customizable Vulnerability and Compliance management investigation, triage, and reporting. Easily research image vulnerabilities and find out which nodes or containers contain those vulnerabilities. Advanced filtering makes reviewing scan and compliance check results easy and provides customized reporting. It also provides standard and customizable compliance reports and templates for PCI, GDPR, and other regulations.
Overview of SUSE® Security Scanning
Scanning is performed at all phases of the pipeline from Build to Registry to Run-Time, on various assets, as shown below.
Scan Type | Image | Node | Container | Orchestrator |
---|---|---|---|---|
Vulnerabilities |
Yes |
Yes |
Yes |
Yes |
CIS Benchmarks |
Yes |
Yes |
Yes |
Yes |
Custom Compliance |
No |
Yes |
Yes |
No |
Secrets |
Yes |
Yes |
Yes |
No |
Modules |
Yes |
N/A |
N/A |
N/A |
Images are scanned either in Registry scanning or through Build-phase plug-ins such as Jenkins, CircleCI, Gitlab etc.
The CIS Benchmarks support by SUSE® Security include:
-
Kubernetes
-
Docker
-
Red Hat OpenShift draft 'Inspired by CIS' benchmarks
-
Google GKE
The open source implementation of these benchmarks can be found on the SUSE® Security Github page.
Secrets can also be detected on Nodes and in Containers with Custom Scripts. |
Kubernetes Resource Deployment File Scanning
SUSE® Security is able to scan deployment yaml files for configuration assessments against Admission Control rules. This is useful to scan deployment yaml files early in the pipeline to determine if the deployment would violate any rules before attempting the deployment. Please see Configuration Assessment under Admission Controls for more details.
Managing Vulnerabilities and Compliance
SUSE® Security provides several ways to review vulnerability and compliance scan results and generate reports. These include:
-
Dashboard. Review summary vulnerabilities and see how they impact the overall Security Risk Score.
-
Security Risks Menu. View the impact of vulnerabilities and compliance issues and generate reports with advanced filtering.
-
Assets Menu. See vulnerability and compliance results for each asset such as registries, nodes, and containers.
-
Notifications → Risk Reports. View scan events for each asset.
-
Response Rules. Create responses such as web hook notifications or quarantines based on scan results.
-
REST API. Trigger scans and pull scan results programmatically to automate the process.
-
SYSLOG/Webhook Alerts. Send scan results to a SIEM or other enterprise platforms.
Security Risks Menu
These menu’s combine the results from registry (image), node, and container vulnerability scans and compliance checks found in the Assets menu to enable end-to-end vulnerability management and reporting. The Compliance profile menu enables customization of the PCI, GDPR and other compliance checks for generating compliance reports.
See the next section on Vulnerability Management for how to manage vulnerabilities in this menu, and the Compliance & CIS Benchmarks section for reporting on CIS Benchmarks and industry compliance such as PCI, GDPR, HIPAA, and NIST.
Assets Menu
The Assets menu reports vulnerabilities and compliance checks results organized by the asset.
-
Platforms. The orchestration platform such as Kubernetes, and vulnerability scans of the platform.
-
Nodes. Nodes/hosts protected by SUSE® Security Enforcers, and results of Compliance checks such as CIS benchmarks and custom checks, as well as host vulnerability scans.
-
Containers. All containers in the cluster including system containers, and the results of Compliance checks such as CIS benchmarks and custom checks, as well as container run-time Vulnerability scans. Process activity and performance statistics can also be found here.
-
Registries. Registries/repositories scanned by SUSE® Security. Layered image scanning results are found here, and scan results can be used in Admission control rules (found in Policy → Admission Controls).
Custom compliance checks as mentioned above are defined in the Policy → Groups menu. |
Automated Run-Time Scanning
SUSE® Security can scan running containers, host nodes, and the orchestration platform for vulnerabilities. In the Assets menu for Nodes or Containers, enable Auto-Scan by clicking on the Vulnerabilities tab for a node or container, then Auto-Scan (appears in upper right) to scan all running containers, nodes, and platform including newly started ones once they start running. You can also select a container or node and scan it manually.
You can click on each vulnerability name/CVE that is discovered to retrieve a description of it, and click on the inspect arrow in the popup to see the detailed description of the vulnerability.
The auto-scan will also be triggered when ever there is an update to the SUSE® Security CVE database. Please see the section Updating the CVE Database for details.
Automated Actions, Mitigations, and Responses Based on Vulnerabilities
Admission control rules can be created to prevent deployment of vulnerable images based on Registry scanning results. See the Security Policy → Admission Control section for details.
Please see the section Security Policy → Response Rules for instructions for creating automated responses to vulnerabilities detected either during registry scanning, run-time scanning, or CIS benchmarks. Responses can include quarantine, webhook notification, and suppression.
Federated Registries for Distributed Image Scanning Results
The primary (master) cluster can scan a registry/repo designated as a federated registry. The scan results from these registries will be synchronized to all managed (remote) clusters. This enables display of scan results in the managed cluster console as well as use of the results in admission control rules of the managed cluster. Registries only need to be scanned once instead of by each cluster, reducing CPU/memory and network bandwidth usage. See the multi-cluster section for more details.
Auto-scaling of Scanner Pods
Scanner pods can be configured to auto-scale based on certain criteria. This will ensure that scanning jobs are handled quickly and efficiently, especially if there are thousands of images to be scanned or re-scanned. There are three possible settings: delayed, immediate, and disabled. When images are queued for scanning by the controller, it keeps a 'task count' of the queue size. Please see the multiple scanners section for more details.
Scanner auto-scaling is not supported when scanner is deployed with an OpenShift operator, as the operator will always change the number of pods to its configured value. |