Projects
page will contain an inventory of all projects added and a high level summary of findings. You can expand on a particular project to learn more about vulnerabilities that may have been found and guidance on how to fix these or optimizations. Let's walk through some examples.Vulnerabilities
, number of Dependencies
, and our Security configuration
. Let's take a closer look and interpret what these results mean.azure-vote.yaml
manifest we applied to our Kubernetes cluster, we can see that we defined some parameters such as cpu
and memory
limits. As a result, these were not flagged during the scan.securityContext
parameters such as readOnlyRootFilesystem
, runAsNonRoot
, allowPrivilegeEscalation
, and capabilities
. As a result, we see this in our findings with the FAIL
flag.container.securityContext.runAsNonRoot
set to false
or unset.container.securityContext.readOnlyFilesystem
set to false
or unset.CAP_SYS_ADMIN
is not added.Dockerfile
is missing. We know this to be true, because our deployment consisted of a manifest file that is pulling an image from a public registry. In the case of our vote-back
and vote-front
applications we are pulling the image from redis
and microsoft/azure-vote-front:v1
respectively.Dockerfile
in our Git repo and pull the image from our private registry. That way we can resolve any issues with our base images and also scan & monitor those through Snyk's integrations to Azure Repos and Azure Container Registry (ACR).