How-tos

Secure your container images before deployment with Vulnerability Advisor

Share this post:

(Ed.–This post covers 1 of 3 related tutorials you can do around Kubernetes-based application development. At the end, the author mentions the other two–on creating a highly scalable web app in Kubernetes, and on setting up log data visualization.)

This section of an overall solution tutorial called “Continuous deployment to Kubernetes“covers the Vulnerability Advisor tool, which checks the security status of container images both before deployment while the containerized app is running.

If you follow the initial steps in the solution tutorial, you will create a Kubernetes cluster, an Express NodeJS app, and a toolchain to continuously deploy the app updates. You will be then ready to use the Vulnerability Advisor as part of a DevOps pipeline.

Start the full tutorial

Security using Vulnerability Advisor

  1. Go to the toolchain you created under DevOps toolchains and click the Delivery Pipeline tile.
  2. Click on Add Stage and change MyStage to Validate Stage.
  3. Click on JOBS > ADD JOB.
  4. Select Test as the Job Type and Change Test to Vulnerability advisor in the box.
  5. Under Tester type, select Vulnerability Advisor. All the other fields should be populated automatically.
  6. Drag and move the Validate Stage to the middle. Container Registry namespace should be same as the one mentioned in Build Stage of this toolchain.
  7. Click Run on the Validate Stage.You will see that the Validate stage fails.

Let’s fix the vulnerabilities.

  • Open the cloned repository in an IDE or select Eclipse Orion web IDE tile, open Dockerfile and add the below command after EXPOSE 3000

RUN apt-get update && apt-get install -y \
libc6 \
systemd \
sensible-utils \
isc-dhcp-client 

  • Commit and Push the changes. This should trigger the toolchain and fix the Validate Stage.

git add Dockerfile
git commit -m "Fix Vulnerabilities"
git push origin master

More about Vulnerability Advisor

Seeing the logs and history, you should have figured out that Vulnerability Advisor provides security management for IBM Cloud Container Service. Vulnerability Advisor generates a security status report, suggests fixes and best practices, and provides management to restrict nonsecure images from running. Fixing the security and configuration issues that are reported by Vulnerability Advisor can help you secure your IBM Cloud infrastructure.

Vulnerability Advisor includes the following features:

  • Scans images for vulnerabilities
  • Provides an evaluation report based on security standards and security practices specific to IBM Cloud Container Service
  • Detects file-based malware
  • Provides recommendations to secure configuration files for a subset of application types
  • Provides instructions on how to fix a reported vulnerable package or configuration issue in its reports

In the Registry dashboard, the SECURITY REPORT column displays the status of your repositories. The report identifies good cloud security practices for your images.

The Vulnerability Advisor dashboard provides an overview and assessment of the security for an image. To find out more about the Vulnerability Advisor dashboard, see Reviewing a vulnerability report.

Slack Integration

As part of the full tutorial, you will setup Slack integration to send notifications on your pipeline stages to a specific channel.

Start the Vulnerability Advisor tutorial

With your pipeline and auto-notifications in place, follow up with another tutorial to add data visualization and analytics to the logging and monitoring that comes with your Kubernetes cluster. And consider doing the tutorial on developing a highly scalable web app. While you’re at it, consider what’s involved in adding a chatbot to that web experience; here’s how online-only banker UBank did it.

Technical Offering Manager & Polyglot Programmer | IBM Cloud

More How-tos stories
September 24, 2018

Migrating Java Microservices from Spring Boot to MicroProfile

Spring or MicroProfile, which one should you pick for more interaction between backend microservices? Which one is more easily adaptable to different user interaction patterns?  And most of all, which one allows you to write less code? This series explores the migrating of our reference Java microservices app from Spring Boot to MicroProfile.

Continue reading

September 20, 2018

Deploying to IBM Cloud Private 2.1.0.3 with IBM Cloud Developer Tools CLI

IBM Cloud Developer Tools CLI version 2.1.4 adds deployment support for IBM Cloud Private 2.1.0.3. This version of IBM Cloud Private uses a more secure Helm for Kubernetes deployments and simplifies the cluster configuration for the client compared to prior IBM Cloud Private releases.

Continue reading

September 19, 2018

Tutorial: Apply End-to-End Security to Cloud Applications

A new tutorial will show you how to use IBM Cloud services to secure your cloud application. Capture and review security-related events, encrypt storage, integrate authentication, and more.

Continue reading