Skip to content

Commit 051ed1e

Browse files
authored
Merge pull request #244571 from dcurwin/wi-118533-container-va-mdvm-july11-2023
Agentless container registry VA page
2 parents 535aa61 + 440c2ec commit 051ed1e

25 files changed

+398
-318
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,8 @@
145145
- name: Defender for Containers support matrices
146146
displayName: Containers, features availability, environment information
147147
href: support-matrix-defender-for-containers.md
148+
- name: Defender for Containers CSPM support matrices
149+
href: support-agentless-containers-posture.md
148150
- name: Protect multicloud resources
149151
items:
150152
- name: The Defender for Cloud multicloud solution
@@ -223,8 +225,6 @@
223225
items:
224226
- name: Agentless container posture
225227
href: concept-agentless-containers.md
226-
- name: Support and prerequisites
227-
href: support-agentless-containers-posture.md
228228
- name: Security recommendations
229229
items:
230230
- name: Reference list of Azure recommendations
@@ -300,14 +300,6 @@
300300
items:
301301
- name: Onboard agentless containers for CSPM
302302
href: how-to-enable-agentless-containers.md
303-
- name: View and remediate vulnerability assessment findings for registry images
304-
href: view-and-remediate-vulnerability-assessment-findings.md
305-
- name: How to test the attack path and security explorer using a vulnerable container image
306-
href: how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
307-
- name: View and remediate vulnerabilities for images running on your AKS clusters
308-
href: view-and-remediate-vulnerabilities-for-images-running-on-aks.md
309-
- name: Disable vulnerability assessment findings on Container registry images
310-
href: disable-vulnerability-findings-containers.md
311303
- name: Security recommendations
312304
items:
313305
- name: Create custom Azure security initiatives and policies
@@ -558,10 +550,22 @@
558550
- name: Enable Defender for Containers
559551
displayName: kubernetes, aks, acr, registries, k8s, arc, hybrid, on-premises, azure arc, multicloud
560552
href: defender-for-containers-enable.md
561-
- name: Vulnerability assessment for Azure Container Registry
553+
- name: Vulnerability assessment for Azure powered by Qualys
562554
displayName: ACR, registry, images, qualys
563555
href: defender-for-containers-vulnerability-assessment-azure.md
564-
- name: Vulnerability assessment for Amazon Elastic Container Registry
556+
- name: Vulnerability assessments for Azure powered by MDVM
557+
items:
558+
- name: Overview
559+
href: agentless-container-registry-vulnerability-assessment.md
560+
- name: Enable vulnerability assessment
561+
href: enable-vulnerability-assessment.md
562+
- name: View and remediate vulnerabilities for registry images
563+
href: view-and-remediate-vulnerability-assessment-findings.md
564+
- name: View and remediate vulnerabilities for running images
565+
href: view-and-remediate-vulnerabilities-for-images-running-on-aks.md
566+
- name: Disable vulnerabilities on images
567+
href: disable-vulnerability-findings-containers.md
568+
- name: Vulnerability assessment for AWS
565569
displayName: AWS, ECR, registry, images, qualys
566570
href: defender-for-containers-vulnerability-assessment-elastic.md
567571
- name: Kubernetes data plane hardening
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
3+
description: Learn about vulnerability assessments for Azure with Microsoft Defender Vulnerability Management.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.date: 07/11/2023
7+
ms.topic: how-to
8+
---
9+
10+
# Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
11+
12+
Vulnerability assessment for Azure, powered by Microsoft Defender Vulnerability Management (MDVM), is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
13+
14+
> [!NOTE]
15+
> This feature supports scanning of images in the Azure Container Registry (ACR) only. Images that are stored in other container registries should be imported into ACR for coverage. Learn how to [import container images to a container registry](/azure/container-registry/container-registry-import-images).
16+
17+
In every subscription where this capability is enabled, all images stored in ACR (existing and new) are automatically scanned for vulnerabilities without any extra configuration of users or registries. Recommendations with vulnerability reports are provided for all images in ACR as well as images that are currently running in AKS that were pulled from an ACR registry. Images are scanned shortly after being added to a registry, and rescanned for new vulnerabilities once every 24 hours.
18+
19+
Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerability Management) has the following capabilities:
20+
21+
- **Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-matrix-defender-for-containers.md#registries-and-images---powered-by-mdvm).
22+
- **Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-matrix-defender-for-containers.md#registries-and-images---powered-by-mdvm).
23+
- **Image scanning in Azure Private Link** - Azure container vulnerability assessment provides the ability to scan images in container registries that are accessible via Azure Private Links. This capability requires access to trusted services and authentication with the registry. Learn how to [allow access by trusted services](/azure/container-registry/allow-access-trusted-services).
24+
- **Exploitability information** - Each vulnerability report is searched through exploitability databases to assist our customers with determining actual risk associated with each reported vulnerability.
25+
- **Reporting** - Container Vulnerability Assessment for Azure powered by Microsoft Defender Vulnerability Management (MDVM) provides vulnerability reports using following recommendations:
26+
27+
| Recommendation | Description | Assessment Key
28+
|--|--|--|
29+
| [Container registry images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)-Preview](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c0b7cfc6-3172-465a-b378-53c7ff2cc0d5 |
30+
| [Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5)  | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
31+
32+
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
33+
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [subassessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
34+
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).
35+
- **Support for disabling vulnerabilities** - Learn how to [disable vulnerabilities on images](disable-vulnerability-findings-containers.md).
36+
37+
## Scan triggers
38+
39+
The triggers for an image scan are:
40+
41+
- **One-time triggering** – each image pushed or imported to a container registry is scanned shortly after being pushed or imported to a registry. In most cases, the scan is completed within a few minutes, but sometimes it may take up to an hour.
42+
43+
> [!NOTE]
44+
> While Container vulnerability assessment powered by MDVM is generally available for Defender CSPM, scan-on-push is currently in public preview.
45+
46+
- **Continuous rescan triggering** – Continuous rescan is required to ensure images that have been previously scanned for vulnerabilities are rescanned to update their vulnerability reports in case a new vulnerability is published.
47+
- **Re-scan** is performed once a day for:
48+
- images pushed in the last 90 days.
49+
- images currently running on the Kubernetes clusters monitored by Defender for Cloud (either via [agentless discovery and visibility for Kubernetes](how-to-enable-agentless-containers.md) or the [Defender for Containers agent](tutorial-enable-containers-azure.md#deploy-the-defender-profile-in-azure)).
50+
51+
## How does image scanning work?
52+
53+
A detailed description of the scan process is described as follows:
54+
55+
- When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
56+
- Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
57+
- Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
58+
- Once a day, or when an image is pushed to a registry:
59+
60+
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
61+
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
62+
- Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63+
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
64+
65+
> [!NOTE]
66+
> For Defender for Container Registries (deprecated), images are scanned once on push, and rescanned only once a week.
67+
68+
## If I remove an image from my registry, how long before vulnerabilities reports on that image would be removed?
69+
70+
Azure Container Registries notifies Defender for Cloud when images are deleted, and removes the vulnerability assessment for deleted images within one hour. In some rare cases, Defender for Cloud may not be notified on the deletion, and deletion of associated vulnerabilities in such cases may take up to three days.
71+
72+
## Next steps
73+
74+
- Learn more about the Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
75+
- Check out [common questions](faq-defender-for-containers.yml) about Defender for Containers.

0 commit comments

Comments
 (0)