Managing Repository Images
Repository images include SWR private images, SWR shared images, SWR enterprise images, and third-party images. SWR-related images are synchronized from SWR to HSS. For details about how to access third-party images, see Connecting to a Third-party Image Repository.
HSS scans these images for vulnerabilities, malicious files, software information, file information, baseline configuration, sensitive information, software compliance, and basic image information. For details about the check items, see Table 1.
You can periodically scan images to detect and clear security risks in a timely manner, improving image security and keeping your assets away from security threats.
Item |
Description |
---|---|
Vulnerabilities |
Detects system and application vulnerabilities in images. |
Malicious Files |
Detects malicious files in images. |
Software Information |
Collects software information in an image. |
File Information |
Collects file information in an image. |
Unsafe Settings |
|
Sensitive Information |
Detects files that contain sensitive information in images.
|
Software Compliance |
Detects software and tools that are not allowed to be used. |
Base Images |
Detects service images that are not created using base images. |
Constraints and Limitations
- Only the HSS container edition supports this function. For details about how to purchase and upgrade HSS, see Purchasing an HSS Quota and Upgrading Your Edition.
- Security scans can be performed only on Linux images.
Viewing Repository Image Information
- Log in to the management console.
- In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
- In the navigation pane, choose Asset Management > Containers & Quota.
If your servers are managed by enterprise projects, you can select the target enterprise project to view or operate the asset and detection information.
- Click Container Images and click Repository Images.
Figure 1 Repository images
- View the repository image information.
You can view the image version, size, and security risks in the image list.
In addition, you can perform the following operations:- Synchronizing all images
Click Synchronize All Images to synchronize all types of SWR images. In the upper right corner of the page, click Manage Task and click Image Synchronization to view the progress of image synchronization tasks.
Images can be synchronized only after being authorized by SWR. For details, see SWR Authorization Methods.
- Filtering images of the latest version
If you select Display latest image versions only, you can filter the latest images of all images.
- Viewing image details
Move the pointer over the target image in the Image column to view Organization and Repository Type. Click the image name to go to the image details page and view the image version, security scan status, and more information.
- Synchronizing all images
Scanning Repository Images
You can manually scan images or set a scheduled scan policy to scan them periodically. The scan duration depends on the image size. Generally, a scan can complete within 3 minutes.
- Log in to the management console.
- In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
- In the navigation pane, choose Asset Management > Containers & Quota.
- Click Container Images and click Repository Images.
Figure 2 Repository images
- Scan images.
- SWR shared images can be scanned only if they are valid.
- Multi-architecture images do not support manual or scheduled scan.
- Scanning an image
- In the Operation column of an image, click Scan.
- Confirm the image information and click OK to start the scan.
- Manually scanning images
- In the upper right corner of the page, click Scan.
- Set manual scan parameters. See Manual Scan. For more information, see Table 2.
Table 2 Manual scan parameters Parameter
Description
Example Value
Risk Type
Select the types of risks to be scanned. HSS scans for software information, file information, and base images by default.
Select all
Speed Limit for Third-party Image Repositories
If you have a large number of third-party images to be scanned, but you are worried that too much network bandwidth will be occupied if they are all scanned at once, you can click to set the number of images to be scanned per hour.
Unlimited
Scan Tasks
A scan task occupies one pod. You can set the number of scan tasks running in the cluster.
For example, if the number of scan tasks is set to 2, only two scan tasks can run in the cluster.
2
Image Scope
Select All or specify images. A full scan takes a long time and cannot be stopped after it starts. Exercise caution when performing this operation.
All
- Click OK.
- Scheduling image scans
- In the upper right corner of the page, click Scheduled Scan Policy.
- Set the scheduled scan parameters, as shown in Figure 4. For details, see Table 3.
Table 3 Parameters of a scheduled scan policy Parameter
Description
Example Value
Scheduled Scan Policy
Whether to enable scheduled scan. After this function is enabled, you can view and configure scheduled scan parameters.
- : disabled
- : enabled
Scheduled Scan Period
Click to select the scan period. The scan time range is fixed to 00:00:00 - 07:00:00.
Every 3 days
Risk Type
Select the types of risks to be scanned. HSS scans for software information, file information, and base images by default.
Select all
Speed Limit for Third-party Image Repositories
If you have a large number of images to be scanned, but you are worried that too much network bandwidth will be occupied if they are all scanned at once, you can click to set the number of images to be scanned per hour.
Unlimited
Image Update Time Range
Select a range of image update time. It determines which images will be scanned.
For example, if you set the scan time range to Last 15 days, HSS scans only the images updated in the last 15 days.
Last 15 days
Scan Tasks
A scan task occupies one pod. You can set the number of scan tasks running in the cluster.
For example, if the number of scan tasks is set to 2, only two scan tasks can run in the cluster.
2
Image Repositories
Select the type of the images to be scanned.
Swr-private
- Click OK to start the scan.
- In the upper right corner of the page, click Manage Task and click the Image Scan tab to view image scan task status.
Viewing Image Scan Results
- Log in to the management console.
- In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
- In the navigation pane, choose Asset Management > Containers & Quota.
- Click Container Images and click Repository Images.
Figure 5 Repository images
- In the row containing the target image, click View Results in the Operation column to go to the image details page.
- View image security scan results. For more information, see Table 4.
Figure 6 Image security report
Exporting an Image Vulnerability Report or Baseline Report
Vulnerability or baseline report cannot be exported for multi-architecture images.
- Log in to the management console.
- In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
- In the navigation pane, choose .
- Click Container Images and click Repository Images.
Figure 7 Repository images
- Click Export Vulnerability above the image list and select a report type to export the vulnerability or baseline report.
If you want to export the vulnerability report of a specified image, select the image type in the search box and click Export Vulnerability.
- View the export status in the upper part of the container management page. After the export is successful, obtain the exported information from the default file download address on the local host.
Do not close the browser page during the export. Otherwise, the export task will be interrupted.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot