Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

How to scan container images with Docker Scout

Researcher by Researcher
May 19, 2023
in Networking
0
How to scan container images with Docker Scout
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Jack Wallen demonstrates how to scan container images for vulnerabilities and dependencies with the new Docker Scout feature.

If you’re deploying containers based on insecure images, the chances of your apps and services being secure is dramatically reduced. To that end, you should be doing everything you can to make sure every image you pull and use is free of vulnerabilities.

Docker will soon be rolling out a new feature, called Docker Scout, that makes it really easy to scan your local images for vulnerabilities as well as understanding application dependencies. You can access Docker Scout from the Docker Desktop app, but do remember this is currently in early access status.

Related articles

How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023
What Is IBM Hybrid Cloud Mesh?

Gartner releases 4 trends that will impact enterprises in 2023

May 27, 2023

Let me show you how easy it is to scan an image for vulnerabilities with this new feature.

The first thing you’ll need to do is download an image. To do this, open Docker Desktop, and type the name of the image you want to pull.

Must-read developer coverage

Say, you’re looking to use the Rocky Linux image. Type Rocky Linux in the search bar, and click on the Images tab. Locate and select the entry for Rocky Linux, and then, click Pull. Once the image has pulled, click Docker Scout in the left navigation, and then, select the Rocky Linux image from the dropdown.

Click Analyze Image, and Scout will begin the process of scanning the image; the time for the scan will depend on the size of the image. Once it completes, click View Packages and CVEs, and read through the list of vulnerabilities.

Scroll through the list, and expand an entry to reveal the known CVEs. You can expand a CVE to read the details about the issue.

Based on the information obtained through Docker Scout, you can then decide to either continue using an image, mitigate any issues contained in an image, or scrap the pulled image in favor of one with fewer or no vulnerabilities. If an image has a number of high or critical vulnerabilities, my advice would be to either mitigate or scrap.

And that’s all there is to scanning container images for vulnerabilities with the new Docker Scout feature.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.



Source link

Tags: ContainerDockerimagesscanScout
Share76Tweet47

Related Posts

How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023
0

Jack Wallen shows you the steps of joining new nodes to a Docker Swarm as a worker and manager to...

What Is IBM Hybrid Cloud Mesh?

Gartner releases 4 trends that will impact enterprises in 2023

May 27, 2023
0

Image: metamorworks/Adobe Stock Enterprise infrastructure and operations teams will have to cope with economic and geopolitical pressures as they pivot...

Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy exposes RSR update gap in 25% of managed macOS devices

May 25, 2023
0

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed...

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

May 24, 2023
0

Dell also zeroed in on zero trust and introduced a modular deployment service as part of its new edge offerings....

Dell’s Project Helix Is a Wide-Reaching Generative AI Service

Dell’s Project Helix Is a Wide-Reaching Generative AI Service

May 24, 2023
0

Dell and NVIDIA joined forces to put generative AI into the hands of Dell's software-as-a-service customers. Image: Yingyaipumi/Adobe Stock Project...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved