More and more we release and rely on an ever growing set of Docker images.
To make short, as Software Developers and DEVOPS engineers, the ones that interest us currently are :
The images we rely on
The image we build ourselves (on top of previous ones)
👉 What we want need to be able to do is : to be able to control the security level of the images we are building...
⚠️ And not release them if they do not reach the expected level of security, depending of the target service.
As all services do not have the same criticity, vulnerabilities level may have different impacts on runtime security governance.
👐 Experimentation and solutions
Fortunately anchore provides a set of ready to use tools that helps... a lot :
grype (vulnerability scanner for container images and filesystems)
syft (CLI tool and library for generating a Software Bill of Materials from container images and filesystems)
A vulnerability scanner for container images and filesystems
A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems.