You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
+43-3Lines changed: 43 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ If there are no entries in the list of attack paths, you can still test this fea
49
49
az aks get-credentials --subscription <cluster-suid> --resource-group <your-rg> --name <your-cluster-name>
@@ -74,7 +74,7 @@ After you completed testing the attack path, investigate the created attack path
74
74
75
75
## AWS: Testing the attack path and security explorer using a mock vulnerable container image
76
76
77
-
1. Create ECR repository named *mdc-mock-0001*
77
+
1. Create an ECR repository named *mdc-mock-0001*
78
78
1. Go to your AWS account and choose **Command line or programmatic access**.
79
79
1. Open a command line and choose **Option 1: Set AWS environment variables (Short-term credentials)**. Copy the credentials of the *AWS_ACCESS_KEY_ID*, *AWS_SECRET_ACCESS_KEY*, and *AWS_SESSION_TOKEN* environment variables.
80
80
1. Run the following command to get the authentication token for your Amazon ECR registry. Replace `<REGION>` with the region of your registry. Replace `<ACCOUNT>` with your AWS account ID.
@@ -103,7 +103,7 @@ After you completed testing the attack path, investigate the created attack path
@@ -122,6 +122,46 @@ The Helm chart deploys resources onto your cluster that can be used to infer att
122
122
123
123
After you completed testing the attack path, investigate the created attack path by going to **Attack path analysis**, and search for the attack path you created. For more information, see [Identify and remediate attack paths](how-to-manage-attack-path.md).
124
124
125
+
## GCP: Testing the attack path and security explorer using a mock vulnerable container image
126
+
127
+
1. In the GCP portal, search for **Artifact Registry**, and then create a GCP repository named *mdc-mock-0001*
128
+
1. Follow [these instructions](https://cloud.google.com/artifact-registry/docs/docker/pushing-and-pulling) to push the image to your repository. Run these commands:
129
+
130
+
```docker
131
+
docker pull alpine
132
+
docker tag alpine <LOCATION>-docker.pkg.dev/<PROJECT_ID>/<REGISTRY>/<REPOSITORY>/mdc-mock-0001
The Helm chart deploys resources onto your cluster that can be used to infer attack paths. It also includes the vulnerable image.
159
+
160
+
> [!NOTE]
161
+
> After completing the above flow, it can take up to 24 hours to see results in the cloud security explorer and attack path.
162
+
163
+
After you completed testing the attack path, investigate the created attack path by going to **Attack path analysis**, and search for the attack path you created. For more information, see [Identify and remediate attack paths](how-to-manage-attack-path.md).
164
+
125
165
## Find container posture issues with cloud security explorer
126
166
127
167
You can build queries in one of the following ways:
0 commit comments