Managing the Repository Image Vulnerability Whitelist
Scenarios
When adding a vulnerability to the whitelist, you need to specify the applicable scope of the whitelist item. If this item only applies to an image, the vulnerability will not be displayed in the scan results of this image, but will still be displayed under other images.
You can whitelist the image vulnerabilities that do not affect services.
You can add, modify, and delete repository image vulnerabilities in the whitelist.
Adding a Repository Image Vulnerability to the Whitelist
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project.
- In the navigation pane on the left, choose Risk Management > Container Images.
- In the upper right corner of the page, click Configure Whitelist.
You can also locate a vulnerability in Risk View or Image View, and click Add to Whitelist in its Operation column.
- On the Repository Images tab page, click Add Rule.
- On the Add Rule page, configure whitelist rule parameters. For details, see Table 1.
Table 1 Vulnerability whitelist rule parameters Parameter
Description
Example Value
Type
Select a vulnerability type from the drop-down list.
- Linux Vulnerabilities
- Application Vulnerabilities
Linux Vulnerabilities
Vulnerability
Select a vulnerability from the drop-down list.
-
Image Scope
Select the applicable image scope of the whitelist item.
- All: all the images affected by the vulnerability
- Specify types of image repositories: specified image repositories affected by the vulnerability
- Specific: specific images affected by the vulnerability You can filter images by repository type or other criteria, and then select images.
Specific, Drupal
Remarks
Enter remarks to help you identify or trace whitelist operations.
test
- Click OK.
- Return to the repository image whitelist. Verify that the whitelisted vulnerability is displayed.
Modifying a Repository Image Vulnerability in the Whitelist
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project.
- In the navigation pane on the left, choose Risk Management > Container Images.
- In the upper right corner of the page, click Configure Whitelist.
- Locate a whitelist item on the Repository Images tab.
- In the Operation column of the item, click Edit.
- On Edit Whitelist Rule page, modify the image scope and remarks.
Table 2 Parameters for modifying a whitelist rule Parameter
Description
Example Value
Image Scope
Select the applicable image scope of the whitelist item.
- All: all images affected by the vulnerability
- Specify types of image repositories: specified image repositories affected by the vulnerability
- Specific: specific images affected by the vulnerability You can filter images by repository type or other criteria, and then select images.
Specific, drupal
Remarks
Enter remarks to help you identify or trace whitelisting operations.
test
- Click OK.
Deleting a Repository Image Vulnerability from the Whitelist
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project.
- In the navigation pane on the left, choose Risk Management > Container Images.
- In the upper right corner of the page, click Configure Whitelist.
- Locate a whitelist item on the Repository Images tab.
- In the Operation column of the item, click Delete.
- In the displayed dialog box, confirm the whitelist information and click OK.
- Return to the image whitelist. Verify that the deleted whitelist item does not exist.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot