Feature Focus: Scanning Docker Images
Containerization has become increasingly popular in modern applications, with Docker images providing a lightweight and portable way of packaging and deploying software. However, scanning source code of custom applications is not enough to guarantee the security of a containerized application. CAST Highlight has developed a new capability that allows users to scan the contents of a Docker image to identify potential risks and vulnerabilities. See how the capability works. As organizations move towards a more agile development approach, containerization has become increasingly popular. Docker images are now the building blocks of many modern applications, providing a lightweight and portable way of packaging and deploying software. However, with the rise of containerization comes a new set of security concerns. While scanning source code of custom applications is essential, it's not enough to guarantee the security of a containerized application. Docker images contain a vast number of Open Source components, which may represent a significant risk if not properly managed. This is why CAST Highlight has developed a new capability that allows users to scan the contents of a Docker image to identify potential risks and vulnerabilities. Scanning Docker images for Open Source components is critical because it provides a comprehensive view of the security and compliance posture of an application. By scanning Docker images, users can identify vulnerabilities, license issues, and obsolete versions of third-party dependencies before they become a threat to the organization. CAST Highlight is now able to automatically scan Docker images. Let’s see how it works.How to scan a Docker image with CAST Highlight’s command line
In the command line, there are a couple of options to include for scanning a Docker image:- dockerImageNameTag: the name and tag of the Docker image you want to scan. Note that image name and tag should be separated by a “#” (e.g., --dockerImageNameTag node#latest)
- includeArchiveContent: the level of depth for extracting content of archive files (.jar, .zip, etc.). For Docker image scans, we recommend a depth level of 3 (e.g., --includeArchiveContent=3)
Requirements & limitations
- CAST Highlight's Command Line version 5.4.75 or higher
- Docker Desktop installed and running
- Access to internet for distant Docker images (i.e., not local to your machine)
- For Linux, local image scan is not possible, it should be distant
- Images with symbolic links are not supported (i.e., all files should be physically present on the machine where the scan happens)
For reference only. For the complete details please refer the original article
https://doc.casthighlight.com/feature-focus-scanning-docker-images/
https://doc.casthighlight.com/feature-focus-scanning-docker-images/
Comments