Qualys Container Security User Guide
Qualys Container Security User Guide
Qualys Container Security User Guide
User Guide
Verity Confidential
Copyright 2018-2023 by Qualys, Inc. All Rights Reserved.
Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
are the property of their respective owners.
Qualys, Inc.
919 E Hillsdale Blvd
4th Floor
Foster City, CA 94404
1 (650) 801 6100
Table of Contents
About this Guide ............................................................................................... 5
About Qualys ........................................................................................................................... 5
Qualys Support ........................................................................................................................ 5
About Container Security Documentation ........................................................................... 5
Verity Confidential
Docker host requirements .................................................................................................... 29
Connectivity ..................................................................................................................... 30
How does registry scanning work? ...................................................................................... 30
Listing Phase .................................................................................................................... 30
Scanning Phase ................................................................................................................ 30
What are the steps? ............................................................................................................... 31
Installing Registry Sensor ..................................................................................................... 31
Adding a new registry to scan .............................................................................................. 31
Creating a registry scan schedule ........................................................................................ 34
How to cancel a scan ............................................................................................................. 36
How to restart a scan ............................................................................................................ 36
Viewing vulnerable registry images .................................................................................... 36
About Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and
compliance solutions. The Qualys Cloud Platform and its integrated apps help businesses
simplify security operations and lower the cost of compliance by delivering critical
security intelligence on demand and automating the full spectrum of auditing,
compliance and protection for IT systems and web applications.
Founded in 1999, Qualys has established strategic partnerships with leading managed
service providers and consulting organizations including Accenture, BT, Cognizant
Technology Solutions, Deutsche Telekom, Fujitsu, HCL, HP Enterprise, IBM, Infosys, NTT,
Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also
founding member of the Cloud Security Alliance (CSA). For more information, please visit
www.qualys.com
Qualys Support
Qualys is committed to providing you with the most thorough support. Through online
documentation, telephone help, and direct email support, Qualys ensures that your
questions will be answered in the fastest time possible. We support you 7 days a week,
24 hours a day. Access online support information at www.qualys.com/support/.
5
Container Security Overview
6
Container Security Overview
Concepts and Terminologies
Docker Image
A Docker image is a read-only template. For example, an image could contain an Ubuntu
operating system with Apache and your web application installed. Images are used to
create Docker containers. Docker provides a simple way to build new images or update
existing images, or you can download Docker images that other people have already
created. Docker images are the build component of Docker.
An image is a static specification what the container should be in runtime, including the
application code inside the container and runtime configuration settings. Docker images
contain read-only layers, which means once an image is created it is never modified.
Image is tracked within Qualys Container Security module using Image Id and also a
unique identifier generated by Qualys called Image UUID.
Docker Registry
Docker registries hold images. These are public or private stores from which you upload or
download images. It serves a huge collection of existing images for your use. These can be
images you create yourself or you can use images that others have previously created.
Docker registries are the distribution component of Docker. See Registry Scanning to learn
about the public and private registries we support for scanning. For instrumentation
support, see Container Runtime Security.
Docker Containers
Docker containers are similar to a directory. A Docker container holds everything that is
needed for an application to run. Each container is created from a Docker image. Docker
containers can be run, started, stopped, moved, and deleted. Each container is an isolated
and secure application platform. Docker containers are the run component of Docker.
A running Docker container is an instantiation of an image. Containers derived from the
same image are identical to each other in terms of their application code and runtime
dependencies. But unlike images that are read-only, each running container includes a
writable layer (a.k.a. the container layer) on top of the read-only content. Runtime
7
Container Security Overview
Concepts and Terminologies
changes, including any writes and updates to data and files, are saved in the container
layer only. Thus multiple concurrent running containers that share the same underlying
image may have different container layers.
Containers are tracked within Qualys Container Security module using Container Id and
also a unique identifier generated by Qualys called Container UUID.
Docker Host
Hosts or servers running on top of ContainerD, CRI-O and Docker Daemon, and hosting
containers and images. Qualys tracks them as Host Assets, collects the metadata
including IP address, DNS and other attributes of the Host. A host in Qualys is identified by
a unique identifier Host UUID. The UUID is also stored in a marker file under
/usr/local/qualys directory by the Agent or a scan with authentication via a Scanner
Appliance.
8
Container Security Overview
What data does Container Security collect?
Currently, the sensor only scans Images and Containers. To scan Hosts, you would require
Qualys Cloud Agents or a scan using Qualys Virtual Scanner Appliance.
Refer to the Qualys Container Security Sensor Deployment Guide to learn about sensor
modes (General, Registry, CI/CD).
9
Container Security Overview
Container Security free version
Click the Take me to Container Security option to enable Container Security free version
for your account.
The Container Security app will show metadata of the images and containers but not the
vulnerability information. You must upgrade to a paid subscription in order to scan the
images and containers for vulnerabilities. See Hosts to learn more.
Container Sensor
Installing the Container Sensor on hosts will fetch vulnerability information for all official
images from Docker Hub, and the first 10 general sensors installed on assets in your
account (does not include sensors for CI/CD and registry scanning). Upgrading to a Trial or
Full (Paid) subscription will remove this limitation.
API Support
APIs to list Containers, Images and Sensors, and fetch Container, Image, Sensor Details are
available for Container Security Free. Upgrade to a paid subscription to get access to all
Container Security APIs. Please refer to the Qualys Container Security API Guide.
10
Container Security Overview
Container Runtime Security
CRS Documentation
CRS User Guide | CRS API Guide
Will I be able to access the data once the retention period has elapsed?
No, once the data is purged as per the retention policies, the data cannot be restored. If
you have any questions regarding the data retention policy for Container Security, please
reach out to Qualys Support.
11
Container Security Overview
Data Retention Policy
12
Get Started
Qualys Subscription and Modules required
Get Started
This chapter provides an overview of Container Security Sensor installation.
For information on deploying the sensor on MAC, CoreOS, and various orchestrators and
cloud environments, refer to the Qualys Container Sensor Deployment Guide.
See About Container Security Documentation
System support
Please refer to the Qualys Container Security Sensor Deployment Guide for a list of
supported systems.
13
Get Started
Deploying Container Sensor
Go to Configurations > Sensors, and then click Download Sensor to download the sensor
tar file. You can see various sensor types:
General (Host) Sensor: Scan any host other than registry / build (CI/CD).
Registry Sensor: Scan images in a registry (public / private).
Build (CI/CD) Sensor: Scan images on CI/CD pipeline (Jenkins / Bamboo).
For Registry you need to append the install command with --registry-sensor or -r
For CI/CD you need to append the install command with --cicd-deployed-sensor or -c
14
Get Started
Proxy Support
Proxy Support
The install script asks for proxy configuration. You need to provide the IP Address/FQDN
and port number along with the proxy certificate file path. For example,
Do you want connection via Proxy [y/N]: y
Enter Https Proxy settings [<IP Address>:<Port #>]: 10.xxx.xx.xx:3xxx
Enter Https Proxy certificate file path: /etc/qualys/cloud-
agent/cert/ca-bundle.crt
Your proxy server must provide access to the Qualys Cloud Platform (or the Qualys Private
Cloud Platform) over HTTPS port 443. See Qualys Platform (POD URL) your hosts need to
access below.
15
Get Started
Static scanning of Docker images
16
Get Started
Users and Permissions
17
Get Started
Users and Permissions
When a user does not have the List permission for an object, then the user will not be able
to view the related data list in the UI or fetch the list from the API. In the UI, you’ll see an
UNAUTHORIZED ACCESS message when you do not have permission to view the list. In
the example below, the user does not have the List Hosts permission.
If the user has the List permission but does not have other permissions like Create,
Update, and Delete, then the list will be visible to the user, but the button or menu option
for the action will not be visible. For example, if the user does not have the Create Registry
permission then the user will not see the New Registry button and will not be able to
create registries from the API.
18
Securing Container Assets
Asset Inventory
Asset Inventory
Upon installation of the sensor, it automatically scans the host for the images and
containers that are present on the host. The inventory and the metadata of the inventory
is pushed to Qualys portal.
Unified Dashboard
Dashboards help you visualize your container environment assets, see your threat
exposure, leverage saved searches, and fix priority of vulnerabilities quickly.
We have integrated Unified Dashboard (UD) with Container Security. UD brings
information from all Qualys applications into a single place for visualization. UD provides
a powerful new dashboarding framework along with platform service that will be
consumed and used by all other products to enhance the existing dashboard capabilities.
You can use the default Container Security dashboard provided by Qualys or easily
configure widgets to pull information from other modules/applications and add them to
your dashboard. You can also add as many dashboards as you like to customize your view.
For help creating widgets, dashboards, templates and more, please refer to the Unified
Dashboard online help.
19
Securing Container Assets
Asset Details
Asset Details
The Assets section lists the Images and Containers discovered along with their metadata
information like ports, networks, services, users, installed software, etc. The assets are
listed along with their associations like associated containers and hosts for an image,
other containers from the same parent image. Users can search for images and containers
based on their attributes.
Jump to a section: Hosts | Images | Containers | Registries
Hosts
The Assets > Hosts tab shows container hosts discovered, scanned by the Qualys Cloud
Agent and/or Qualys Network Scanner. Currently, container hosts discovered, scanned
only by the Qualys Container Sensor are not shown in this list. It is recommended you use
the Images or Containers tabs for these. Additionally, Qualys Container sensors currently
only support hosts and clusters with Linux-based host OSes and Mac OS.
For each host in the list, you’ll see the image and container count. Image and container
details can be viewed in their respective tabs.
Use QQL search tokens to search for hosts. See the online help for a list of search tokens.
Access the details page for a host from the Sensor details page. Asset Details view displays
information about the host on which the sensor is deployed. Besides system, network, and
port information, the Asset Details view also displays a list of software installed on the
host, vulnerabilities present, certificates, and Threat Protection RTIs (when Qualys TP app
is enabled). Container Security panel shows all containers installed on the host, their
status, and the images from which the containers are spawned.
20
Securing Container Assets
Asset Details
Images
The Assets > Images tab shows the discovered images along with their metadata
information. Use QQL search tokens to search for images. See the online help for a list of
search tokens.
Select Add Tags from the Quick Actions menu to assign static asset tags to images. You
have the option to create new tags while adding them. You can also choose to pass on the
assigned tags to containers that are associated with the selected images.
Select View Details from the Quick Actions menu for any image in the list to get
comprehensive information about the image. You can view detailed information about the
image, its associations with containers, drift containers, and hosts.
- The Installed Software section displays software having vulnerabilities, and for which
fixes (patches) are available.
21
Securing Container Assets
Asset Details
Containers
The Assets > Containers tab shows the discovered containers along with their metadata
information. Use QQL search tokens to search for containers. See the online help for a list
of search tokens.
22
Securing Container Assets
Asset Details
Select Add Tags from the Quick Actions menu to assign static asset tags to containers.
You can also create new tags on the fly while assigning them.
Select View Details from the Quick Actions menu for any container in the list to get
comprehensive information about the container. You'll get detailed information about the
container, its associations with an image, drift containers, and hosts.
- Container “State” is updated based on the docker events (exec_start, kill, destroy, stop)
that Qualys Sensor reports to Qualys Cloud Platform.
- The Services/Users section displays the list of services available in the container and
users associated with the container.
- The Installed Software section displays software having vulnerabilities, and for which
fixes (patches) are available.
- The Vulnerabilities section provides vulnerability information, such as confirmed and
potential vulnerabilities with their severity. For each vulnerability you'll see the
vulnerability age (in days). Age is calculated from the point Qualys published the
vulnerability.
- The Compliance provides a list of controls that were scanned with control details (CID,
criticality, statement, category, technologies).
23
Securing Container Assets
Vulnerability scanning of Docker Images
Registries
The Assets > Registries tab shows the registries in your account. Use QQL search tokens
to search for registries. See the online help for a list of search tokens.
Select View Details from the Quick Actions menu for any registry in the list to get
comprehensive information about the registry. You can view detailed information about
the registry: number of repositories, total number of images and number of vulnerable
images within that registry. The Scan Jobs panel lists the On Demand and Automatic Jobs
created for that registry. For more information, see Registry Scanning.
24
Securing Container Assets
Vulnerability scanning of Docker Images
Qualys scans the docker images for vulnerabilities not through static analysis but via a
non-static method, where it looks at the Image as a complete entity. This process is more
effective and has lesser false positives (FP) than the more commonly used Static Analysis.
Docker Images are found distributed across the environment from developer laptops,
build systems, Image Registry to being cached on the docker hosts running Containers. To
scan for vulnerabilities you would need the Container Sensor deployed on the host asset.
To get an inventory of the images and scan them for vulnerabilities, deploy the container
sensor on the host. Refer to Deploying Container Sensor for the install instructions and
system requirements.
25
Securing Container Assets
Vulnerability scanning of Docker Images
To start, deploy the Container Sensor on the Build host where the images are being
created. The sensor upon install would automatically trigger a vulnerability analysis of
the new images found. Use the API or the plug-in to look for vulnerabilities in the Images.
If you are in Jenkins or Bamboo environment, the plug-in would provide detail list of the
vulnerabilities and its details directly within the plug-in, you could optionally access your
Qualys subscription to view the full report.
In the Registry
Currently, the Qualys Container Sensor doesn’t automatically poll or pull images to do an
analysis. Rather you would need to deploy the sensor on the host that is configured to pull
images from the registry. Either manually or via a cron pull the new images to the host.
The sensor does an automatic analysis as soon as it finds a new image. Use the APIs or the
Qualys portal to query for the vulnerabilities identified.
How it Works
We support scanning Docker images pulled from Amazon Elastic Container Registry
(Amazon ECR) with x86_64 architecture. When an AWS ECS Fargate task is launched, the
AWS EventBridge rule created during Qualys deployment consumes the event. The
EventBridge rule is set in such a way that it triggers the Qualys scanning Lambda function.
The Qualys Lambda function then processes the event received from EventBridge to
decide on image scanning. The Qualys Lambda function launches the AWS CodeBuild to
run the Qualys sensor, which pulls the image from Amazon ECR and then performs the
26
Securing Container Assets
Vulnerability scanning of Docker Images
vulnerability and compliance scan on the image. After a successful image scan, image
metadata gets uploaded to the Qualys Cloud Platform for evaluation, and users can view
details from the Container Security UI & API.
Serverless Configuration
Go to the Serverless tab under Configurations. Click the Show Instructions button to
open the Qualys Container Sensor Deployment Guide for configuration steps. After you
complete the one-time configuration, all images deployed from Amazon ECS tasks in AWS
Fargate will be scanned automatically and results will be uploaded to your account.
27
Securing Container Assets
Vulnerability scanning of Docker Containers
Good to know
Drift Containers are those which contain vulnerabilities or software, not found in the
image from which the container is spawned.
Rogue Vulnerabilities are classified as either New, Fixed or Varied. New are those which
are newly found on the containers, but were not present in the image from which the
container is spawned. Fixed, are the vulnerabilities that are not found in the container but
in the image. Varied, are the vulnerabilities that are found in both Containers and Images
but the detection varies between them.
Rogue Software are classified as new or removed. New, software which are found in the
Container but not in the image from which the container is spawned. Fixed, Software not
seen in the Container but is present in the parent Image.
28
Registry Scanning
Docker host requirements
Registry Scanning
Using Qualys Container Security you can scan public and private registries. Public
registries are cloud accessible registries hosted on Amazon, Azure and Google. While,
private registries are on premise registries deployed on a private network such as those
hosted using Artifactory or Nexus. Qualys supports scanning only authenticated
registries. Note: Currently you can only scan V2 type of registries with Qualys Container
Security. We support scanning the following registries:
Public registries: Docker Hub, AWS ECR, Google Cloud Registry (GCR), Google Artifact
Registry, Azure Container Registry (ACR)
Private registries: v2-private registry
- Docker Private Registry: insecure (http), secure (auth + https)
- Docker Trusted Registry
- Harbor
- JFrog Artifactory Private
- Mirantis Secure Registry (MSR) 2.9.4+
- OpenShift Container Registry (OCR)
- RedHat Quay
- Sonatype Nexus
Note: Using http requires customers to manually configure their docker-engine for the
registry. Qualys does not recommend using http and it’s intended more for testing in dev
environments.
For details on the sensor versions supported for each registry type and interoperability
with 3rd party solutions, refer to the Qualys Container Security Interoperability Matrix.
For instrumentation support, see Container Runtime Security.
29
Registry Scanning
How does registry scanning work?
Connectivity
The registry sensor host should have connectivity to the registry to be scanned. If runtime
is Docker, you can validate connectivity by performing a successful docker login from the
host to the registry. If runtime is Containerd or CRI-O, you can validate connectivity by
trying to pull any image from the registry.
Docker Runtime:
docker login <registryurl> (No protocol)
For Example:
docker login myregistry.com:5001
Containerd/CRI-O Runtime:
crictl pull anyimage from registry
Listing Phase
In the Listing phase, the Container Security sensor calls Docker Registry v2 APIs to collect
all the image metadata information for the repository provided in the registry scan
schedule.
Qualys sensor makes catalog, tag, manifest and config API calls to collect information and
this information is displayed on the UI. Based on the filters defined in the schedule by the
user (e.g., scan images created in last 14 days), the images are queued for scanning.
Note - For public registries (cloud accessible), Qualys makes the Docker Registry API calls
and fetches information to feed the sensors for performing an image scan. In case of
private registries, as Qualys cannot connect to them, the sensor performs both listing and
scanning actions and sends information to Qualys.
Scanning Phase
Sensors which are provisioned as registry sensors, poll Qualys periodically to see if any
images are queued for scanning. Qualys assigns only a subset of discovered images to the
sensor for scanning. The response payload includes image details along with
authentication credentials required to pull image from the registry.
Qualys Registry Sensor pulls these images from the registry and gathers and pushes the
information (snapshot) to Qualys Cloud. Qualys then runs signatures on the collected
information and generates a vulnerability report which can be viewed on the Container
Security UI. If the repository has a lot of images to scan, the overall scanning time might
be longer than usual. You can install multiple registry sensors to distribute the scanning
payload to reduce the scan time and view the results faster.
30
Registry Scanning
What are the steps?
31
Registry Scanning
Adding a new registry to scan
In order to perform vulnerability and compliance analysis, you’ll need to connect to the
registries using registry authentication. Different types of authentication are needed to
connect to different types of registries.
Registry
authentication types
are Token, BasicAuth,
DockerHub, AWS.
Note: Token
authentication is used
by the sensor host
while connecting to
the registry if the
registry supports
token-based
authentication.
The following table lists the privileges required for authentication for different private
registries:
Registry Authentication Privileges Required Description
JFrog Artifactory Any user Authenticate using either of the
Private following:
- Credentials of any user account
- An access token
Mirantis Secure Administrator Enter the credentials of an
Registry (MSR) administrator account.
2.9.4+ Mirantis Secure Registry supports
token-based authentication.
OpenShift Registry-Viewer Enter the service account
Container credentials.
Registry (OCR) The registry-viewer role must be
associated with the service account.
RedHat Quay Administrator or Super user Enter the credentials for any of the
following accounts:
- An account with administrator or
super user privileges
- A robot account
32
Registry Scanning
Adding a new registry to scan
For public registries, a role with reader privileges is sufficient to connect to the registries
and access the resources.
For AWS ECR, you can create a connector to connect to your AWS Global or US GovCloud
account. If you selected a standard AWS region, then pick the Global account type in
connector details. If you selected a US GovCloud region, then you must pick the US
GovCloud account type in connector details.
Note: Currently, the registry sensor can only scan AWS ECR Private repositories.
33
Registry Scanning
Creating a registry scan schedule
For GCR (Google Cloud Registry), you can create a connector to connect to your GCP
account.
For ACR (Azure Container Registry), create a connector to connect to your Azure account.
Scan Type
You can choose to scan immediately (On Demand) or on an on-going basis (Automatic).On
Demand scan allows you to scan repositories as well as specific images within those
repositories (use date and tag filters). With Automatic scan, you can scan entire
repositories on a recurring basis following a user-specified scan schedule.
34
Registry Scanning
Creating a registry scan schedule
Repository
Add one or more repositories to scan. In the Repository field, enter the full repository path
up to the last sub-directory containing the images you want to scan. Tip: The following
command helps you to get a list of full repository names that are part of a registry.
curl -u <username>:<password> https://<registry-url>/v2/_catalog
Notes:
- For Google Cloud Registry, the repository name should not include location information
since you already provided the location under registry information. For example, the
repository name should be: project-Id/repository-name
- For Google Artifact Registry, only the repository name is needed. We'll auto populate the
full path.
35
Registry Scanning
How to cancel a scan
To get the total count of vulnerable images in a registry, go to Assets > Registries tab, and
choose View Details from the Quick Actions menu for any registry. You’ll see basic
information like total repositories, total images and total vulnerable images. You’ll also
see a list of scan schedules created for scanning the registry.
36
Defining Vulnerability Exceptions (Beta)
Viewing vulnerable registry images
37
Defining Security Policies
Viewing vulnerable registry images
38
Sensor Profiles
Sensor Profiles
You can create sensor profiles, edit the configuration values, and assign the profiles to the
sensors.
For registry sensors, you can configure sensor profiles to control which sensors are used
for scanning different registries. Each profile associates a list of registries with a list of
sensors that can scan them. This is especially useful when you have sensors that don’t
have Internet access and are not able to scan cloud-based registries. Now you can create a
profile with your cloud-based registries and include only the sensors that can reach them
for scanning.
Good to Know
- If you do not associate a sensor profile with a sensor, the default sensor profile is used.
- You can associate one sensor with only one sensor profile.
- In case of registry sensors,
- You can add multiple registries in a sensor profile.
- At the scan time, only sensors associated with a registry are used for the
scan job. If a registry is not included in a sensor profile, then any sensor can
be used to scan it.
- By default, all the sensors and registries that are not associated with any
profile will come under Default sensor profile. Any of the registries in the
default profile can be scanned from any of the sensors available in the
Default sensor profile.
39
Sensor Profiles
To see more details for a profile in the list, select View from the Quick Actions menu.
To perform actions such as add a sensor profile, update a sensor profile, delete a sensor
profile, refer Manage Sensor Profiles section in the Online Help.
40
Vulnerability Reporting
Create Reports
Vulnerability Reporting
Create customizable QQL query driven on-demand report jobs. Reports are driven by
reporting templates. Currently we support vulnerability report templates for Images and
Containers. Reporting workflows can be performed from the “Reports” tab in the
Container Security UI.
These vulnerability report templates are available:
- Image Vulnerability Report
- Container Vulnerability Report
Create Reports
Go to the Reports section (on the top menu) and click the Create Report button.
Walk through the Create New Report wizard. In the Report Details section, give your
report a name and description. In the Report Source section, choose the report template
for the type of report you want to create: Image Vulnerability or Container Vulnerability.
You may choose to add a search query to limit the report to certain images/containers. For
an Image Vulnerability report, only the images that match your query will be included. For
a Container Vulnerability report, only the containers that match your query will be
included.
41
Vulnerability Reporting
View & Download Reports
In the Report Schedule section, specify whether you want to create an on-demand report
or a scheduled report. For a scheduled report, you need to define a schedule to run the
report at regular intervals. You can create a daily, weekly, or monthly recurring schedule.
The Report Display section shows you the types of details that can be included in the
report. Simply select the check box next to each detail you want to include in the report.
Your selections determine which columns appear in the CSV output. Note that certain
details are selected by default and cannot be unchecked. Want to include all details? Pick
the “Select All” option and all details will be included.
For an on demand report, specify the time zone in which you want to view the dates and
time in your report.
Click Next again to review the Report Summary and click Submit to generate your report
job. Once saved, the report job cannot be edited.
Your report job will appear on the reports list with a status of . The status will
change to once the report is done and ready to download.
42
Vulnerability Reporting
Delete Reports
Delete Reports
To delete a single report, choose Delete from the Quick Actions menu, as shown below. To
delete multiple reports in bulk, select each row for the reports you want to delete and
choose Actions > Delete above the reports list.
43
Compliance Scanning
Prerequisites
Compliance Scanning
Qualys supports compliance scanning/assessments of running containers and images.
Perform Policy Compliance (PC) checks and configuration assessments on your running
containers and images. We support a subset of controls from CIS Docker benchmarks,
which are applicable to running containers and container images. Customers can assess
configuration risks in their running containers and images and remediate them
accordingly based on the Qualys findings.
Prerequisites
Upgrade your sensors to the latest version (sensor version 1.9.0 or later).
How it works
The updated Qualys Container Sensor runs an additional scan of configurations in
containers, images and uploads additional scan metadata to the Qualys backend. Based
on the scan metadata, the backend performs an assessment against various industry
standard benchmarks and controls for compliance assessment. The compliance scans of
containers, images will be transparent to customers and will function in a similar real-
time cloud native manner like the vulnerability scanning feature. The configuration scan
results will be available in the UI and the API. In the UI, view Image and Container details
to get compliance posture (PASS or FAIL) and control information.
44
Compliance Scanning
View compliance information
Easily search images and containers by control ID, control criticality (MINIMAL, MEDIUM,
SERIOUS, CRITICAL, URGENT) and control posture (PASS, FAIL).
45
Compliance Scanning
View compliance information
Drill down into the details for any image or container to see compliance information,
including the list of controls that were scanned with control details (CID, criticality,
statement, category, technologies).
Drill down into the details for any control to get control details, including the control
category, policy and technologies.
Compliance information can also be fetched using Compliance APIs. You can fetch
compliance posture for an image or container, fetch control details, or fetch a list of
controls. See the Compliance section of the Qualys Container Security API Guide.
46
SCA Scanning
Prerequisites
SCA Scanning
Qualys supports Software Composition Analysis (SCA) scanning of container images. An
SCA scan discovers installed open source software and libraries, as well as associated
vulnerabilities, present in your container images.
While evaluating security posture of container images it is important to identify all
software packages present in the image. The SCA scan can be used to identify
programming language-based software packages inside the image. In addition, metadata
information for each image layer is also provided. The SCA scan detects packages for these
programming languages: Java, Python, Go, Node.js, .NET, PHP, Ruby, and Rust.
SCA scanning is available for all sensor types (General, Registry, and CI/CD), and is
supported for Docker, containerd, and CRI-O runtimes. Also, SCA scanning is only
supported when scanning container images. SCA scanning is not supported for Mac OS.
Prerequisites
• The SCA Scanning feature must be enabled for your subscription. Contact Qualys
Support to have this feature enabled.
• Update your sensors to sensor version 1.19 or later.
• Relaunch your sensors with the parameter --perform-sca-scan to perform SCA
scanning.
How it works
SCA scanning is not performed by default. Users must enable SCA scanning using the new
parameter --perform-sca-scan when deploying their sensors. When enabled, an SCA scan
is performed after a standard vulnerability scan (Static or Dynamic) on your container
images. When the SCA scan completes, the sensor uploads the metadata information
collected by the scan to the Qualys backend where posture evaluation is performed. You
can view SCA scan data findings in the Container Security UI and API as part of image
details. Vulnerability detections found by the SCA scan are presented as QIDs. Filters are
provided so you can identify the type of scan (SCA, Dynamic or Static) used to detect a
particular vulnerability.
During an SCA scan, the following files are scanned for the language-specific software
packages:
Language Files
Python egg package
wheel package
Node.js package.json
47
SCA Scanning
View SCA Scanned Images
Language Files
.NET packages.lock.json
packages.config
*.deps.json
Java JAR/WAR/PAR/EAR
Go Binaries built by Go
PHP Composer.lock
Ruby gemspec
Rust Cargo.lock and Binaries built with cargo-auditable
48
SCA Scanning
View SCA Scanned Images
The Installed Software tab lists software detected by scans. Use the Packages filter to
easily switch the list view. Choose All to see all software packages, choose OS to see only
Operating System based packages, or choose Non-OS to see SCA related packages.
You can also search installed software detected by SCA scans using scanType: SCA.
49
SCA Scanning
View SCA Scanned Images
The Vulnerabilities tab shows vulnerabilities detected by all scans, including SCA scans.
The SCAN TYPE column identifies the type of scan used for each detection.
You can also search vulnerabilities detected by SCA scans using scanType: SCA.
50
SCA Scanning
View SCA Scanned Images
For example, let’s say we scan an image using a sensor launched with the Perform SCA
flag enabled and get 25 vulnerabilities reported. We launch a container on this image and
it reports 22 vulnerabilities. 3 vulnerabilities were excluded because they were package
based.
51
Secret Detection
View SCA Scanned Images
Secret Detection
Container secrets are digital credentials providing identity authentication and authorizing
access to privileged accounts, applications, and services. They can include passwords, API
keys, and other credentials that are needed for applications to function properly.
If these secrets are not properly secured, they can be accessed by unauthorized users,
leading to malicious attacks. Therefore, discovering secrets is one of the important aspects
of container security that organizations must prioritize to protect their sensitive data,
meet compliance requirements, and reduce the risk of security incidents.
Container Security can detect secrets for container images enabling you to mitigate
potential security risks associated with the accidental or intentional exposure of secrets
within containers.
In the Configuration > Secret Detection tab, you can see the secret detectors or the set of
rules for identifying various types of secrets. Currently, only the default system-defined
detectors are available.
Click View Details from the Quick Actions menu to view the details of a detector. Note
that it is currently not possible to create new detectors or modify existing ones.
Note: Secret detection is supported only on:
- Sensors: CICD and registry
- OS: Linux
- Runtimes: Docker, Containerd, and CRI-O
For more information, refer to Online Help: Detecting Container Secrets.
52
Administration
Sensor updates
Administration
For information on sensor installation and troubleshooting, refer to the Qualys Container
Security Sensor Deployment Guide.
Sensor updates
Go to Configurations > Sensors to see a list of sensors. Use the search and filter options to
search for sensors. See the online help for a list of QQL search tokens.
When a newer sensor version is available than the one deployed, you’ll see “Update
Available” next to the sensor name. You should update the sensor to the newer version to
take advantage of new features, bug fixes and to remediate vulnerabilities.
53
Administration
How to uninstall sensor
To uninstall a sensor:
If the docker host is configured to communicate over docker.sock, use the following
command:
./uninstallsensor.sh -s
If the docker host is configured to communicate over TCP socket, then provide the address
on which the docker daemon is configured to listen:
./uninstallsensor.sh DockerHost=<<IPv4 address or FQDN>:<Port#>> -s
Example:
./uninstallsensor.sh DockerHost=10.11.12.13:1234 -s
Follow the on-screen prompts to uninstall the sensor. Qualys recommends not to clear the
persistent storage.
54