Tenable Enclave Security Container Security
Tenable Enclave Security Container Security
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
System Requirements 4
Dashboard 8
Vulnerabilities 9
Export a Vulnerability 9
Assets 10
Images 10
Export an Image 11
Delete an Image 11
Packages 12
Layers 12
Scans 14
Create a Scan 14
Edit a Scan 21
Run a Scan 22
-2-
Delete a Scan 22
Scan Settings 22
Scanners 25
Add a Scanner 25
Edit a Scanner 26
Update a Scanner 27
Delete a Scanner 28
Reporting 29
-3-
Welcome to Container Security for Tenable Enclave Security
Container Security stores and scans container images as the images are built, before production. It
provides vulnerability and malware detection, along with continuous monitoring of container
images. By integrating with the continuous integration and continuous deployment (CI/CD) systems
that build container images, Container Security ensures every container reaching production is
secure and compliant with enterprise policy.
Container Security comes bundled with Tenable Enclave Security. For details about Tenable Enclave
Security, see the Tenable Enclave Security user guide.
Note: To access Container Security, you must be logged in to Tenable Enclave Security as an
organizational user. Admin users do not have access to Container Security.
See the following pages for information about using Container Security.
System Requirements
For information about licensing Container Security, see License Requirements in the Tenable
Enclave Security user guide.
System Requirements
For more information about Tenable Enclave Security system requirements, see System
Requirements in the Tenable Enclave Security user guide.
-4-
# of Assets Managed by Container Disk
Service Name CPU Memory
Security Space
Requirements for Container Security database in Azure for PostgreSQL flexible servers
-5-
Requirements for Container Security database in GCloud
# of Assets Managed by Container Security Instance Type Read Replica Disk Space
-6-
Settings and Information
To view your Container Security settings, in the top navigation, click Settings & Information.
In the Settings & Information menu, you can view the following:
l Access Control - For more information, see Access Control in the Tenable Enclave Security
user guide.
l System Logs - For more information, see System Logs in the Tenable Enclave Security user
guide.
-7-
Dashboard
The Dashboard page in Container Security contains widgets that display high-level information
about your containers, images, image repositories, and policies. Click a widget on the dashboard to
view details about the item type or to import data items into Container Security.
-8-
Vulnerabilities
To view the Vulnerabilities page, in the left navigation, click Vulnerabilities.
The Vulnerabilities page displays a list of all vulnerabilities discovered by Container Security scans.
Export a Vulnerability
Export a Vulnerability
To export a vulnerability:
The Vulnerabilities tab appears, which displays a list of vulnerabilities detected by Container
Security.
2. In the table, right-click the row for a vulnerability, and click Export Vulnerability.
3. In the File Name box, type a name for the export file.
4. In the Configuration section, select the fields you want to include in the export file.
5. Click Export.
-9-
Assets
To view the Assets page, in the left navigation, click Assets.
On the Assets page, you can view the container registries that Container Security is scanning, and
the associated images, packages, and layers.
In the left panel, you can search for a registry or repository. Clicking a registry or repository filters
the table on the right.
Note: Container Security assets do not age out. To manage your license usage, Tenable
recommends you periodically delete unused assets.
Images
Export an Image
Delete an Image
Packages
Layers
Images
To view your images, in the left navigation, click Assets > Images.
In the left panel, you can search for a registry or repository. Clicking a registry or repository filters
the list of images on the left.
Select Show Only Base Images to filter the list by the base image of each registry.
Note: Container Security assets do not age out. To manage your license usage, Tenable
recommends you periodically delete unused assets.
- 10 -
View Image Details
Export an Image
Delete an Image
The Images tab appears, which displays a list of images from your scanned repositories.
The right pane appears, which displays details for the image.
Export an Image
To export an image:
The Images tab appears, which displays a list of images from your scanned repositories.
2. In the table, right-click the row for an image, and click Export Image.
3. In the File Name box, type a name for the export file.
4. In the Configuration section, select the fields you want to include in the export file.
5. Click Export.
Delete an Image
Deleting a Container Security image also deletes all associated packages, layers, and vulnerabilities.
Note: Container Security assets do not age out. To manage your license usage, Tenable
recommends you periodically delete unused assets.
- 11 -
To delete an image:
The Images tab appears, which displays a list of images from your scanned repositories.
2. In the table, right-click the row for an image, and click Delete.
3. Click Delete.
The image is deleted, including all of the image's packages, layers, and vulnerabilities.
Packages
To view your packages, in the left navigation, click Assets > Packages.
The Packages tab appears, which displays a list of packages from your scanned repositories.
The right pane appears, which displays details for the package.
Layers
To view your images, in the left navigation, click Assets > Layers.
- 12 -
1. In the left navigation, click Assets > Layers.
The Layers tab appears, which displays a list of layers from your scanned repositories.
The right pane appears, which displays details for the layer.
- 13 -
Scans
To view your scans, in the left navigation, click Scans.
On the Scan Management page, you can configure Container Security scans to collect data about
your containers for analysis. Depending on your organization, one person may perform all the steps,
or several people may share the steps.
Create a Scan
Edit a Scan
Run a Scan
Delete a Scan
Scan Settings
Create a Scan
By default, Container Security scans will scan all images in a registry. To scan a single image, see
Configure a CI/CD Scan.
To create a scan:
- 14 -
3. In the Name box, type a name for the scan.
4. In the Scanner box, select a Container Security scanner that you configured in Add a Scanner.
5. In the Registry URL box, type the URL for the registry that you want to scan.
Note: Scan settings may affect the results of the scan. For more information, see Scan
Settings.
6. In the Registry Type box, select the type of registry that you want to scan. The following are
the available registry types:
l Docker
l DockerHub
l Jfrog
l Harbor
l AWS ECR
l Azure ACR
l Quay
l Nexus
7. (Optional) In the Username box, type the username that Container Security will use to
authenticate to the registry.
8. (Optional) In the Password box, type the password that Container Security will use to
authenticate to the registry.
a. In the Start On box, select the date you want the scan to start running.
b. In the Time box, select the time of day you want the scan to start running.
c. In the Time Zone box, select the time zone for the scan schedule.
d. In the Frequency box, select how often you want the scan to run.
- 15 -
-or-
l Add a Scanner.
l To pull an image from a registry to the same host as your scanner, use the following
command:
-or-
l To build an image on the same host as your scanner, use the following command:
2. In the CLI of the machine where you want to run the scanner, run the customized
configuration and command for your deployment type using the following parameters:
./consec image \
--pipeline-name <your-pipeline-name> \
--pipeline-type JENKINS \
- 16 -
--policy-config <tes_policy.json> \
<image-name>:<image-tag>
Where:
l pipeline-type is the type of CI/CD pipeline provider. If you do not include a pipeline
type, this field defaults to CUSTOM.
l policy-config is the path to the scan policy that you created in Configure CI/CD Scan
Policies. If you do not include a scan policy, then the scan will not perform policy
configuration.
3. Press Enter.
CI/CD scan policy conditions apply to the entire image, not individual plugins.
group_ The group_operator field accepts only AND and OR. The group_operator
operator applies to the list of entries.
entries Each entries item contains a label, operator, field, and policy_value.
label An arbitrary string that describes the policy entry. For example, "Cvssv3
cannot be greater than 7"
- 17 -
Field Description
operator The operation that you want to trigger policy violations on. Some fields only
support the EQ operator. The following are the supported operators:
l EQ - equal to (=).
field Any of the fields you want to support policy evaluation on. The following are
the supported fields:
l VPR - only supports floating point numbers as values, from 0.0 to 10.0.
l EPSS - only supports floating point numbers as values, from 0.0 to 100.0.
- 18 -
Simple Policy
The following policy triggers a violation when the CVSS v3 score is greater than or equal to 7.
{
"policy_groups": [
{
"entries": [
{
"label": "Cvssv3 cannot be greater or equal to 7",
"operator": "GTE",
"field": "CVSS3",
"policy_value": "7"
}
],
"group_operator": "OR"
}
]
}
-or-
{
"policy_groups": [
{
"entries": [
{
"label": "Cvssv3 cannot be greater or equal to 7",
"operator": "GTE",
"field": "CVSS3",
"policy_value": "7"
},
{
"label": "Vpr cannot be greater or equal to 7",
"operator": "GTE",
"field": "VPR",
"policy_value": "7"
}
],
"group_operator": "OR"
}
]
}
- 19 -
l The CVSS v3 score is greater than or equal to 7.
-and-
{
"policy_groups": [
{
"entries": [
{
"label": "Cvssv3 cannot be greater or equal to 7",
"operator": "GTE",
"field": "CVSS3",
"policy_value": "7"
},
{
"label": "Vpr cannot be greater or equal to 7",
"operator": "GTE",
"field": "VPR",
"policy_value": "7"
}
],
"group_operator": "AND"
},
{
"entries": [
{
"label": "CVE-123 exists",
"operator": "EQ",
"field": "CVE",
"policy_value": "123"
}
],
"group_operator": "OR"
}
]
}
l The CVSS v3 score is greater than or equal to 7, and the VPR score is greater than or equal to
7.
OR
- 20 -
"policy_groups": [
{
"entries": [
{
"label": "Cvssv3 cannot be greater or equal to 7",
"operator": "GTE",
"field": "CVSS3",
"policy_value": "7"
},
{
"label": "Vpr cannot be greater or equal to 7",
"operator": "GTE",
"field": "VPR",
"policy_value": "7"
}
],
"group_operator": "AND"
},
{
"entries": [
{
"label": "CVE-123 exists",
"operator": "EQ",
"field": "CVE",
"policy_value": "123"
},
{
"label": "curl-1.1 exists",
"operator": "EQ",
"field": "PACKAGE",
"policy_value": "curl-1.1"
}
],
"group_operator": "OR"
}
]
}
Edit a Scan
To edit a scan:
2. In the table, right-click the row for the scan you want to edit, and click Edit.
- 21 -
-or-
Run a Scan
To run a scan:
2. In the table, right-click the row for a scan, and click Run.
Delete a Scan
To delete a scan:
2. In the table, right-click the row for a scan, and click Delete.
3. Click Delete.
Scan Settings
The Scan Settings page displays your license utilization and configuration settings for Container
Security scans.
The License Utilization section displays your current license usage. For more information, see
License Requirements. To reduce your license utilization, To reduce your license utilization, delete
assets on the Images tab of the Assets page. For more information, see Assets.
- 22 -
Use the fields below to point to the different registries that you want to scan for images. You can
further refine this by explicitly indicating when to scan, the number of scans, and exactly where to
scan.
Note: These settings do not apply to active scans. To apply these settings to an active scan, you must stop
and restart the scan after saving the settings.
Option Description
Global Settings
Images with a build time Images built in the last 90 days are scanned by default. You can
less than customize this setting to scan images built within a minimum of
1 day or a maximum of 10,000 days; otherwise the default of 90
days will apply.
Maximum number of The default scan limit is 20 images per repository. You can
images to scan per customize this setting to scan a minimum of 1 image or a
repository maximum of 100,000,000 images; otherwise, the default limit of
20 images will apply.
Scan Inclusion
Use these fields to specify the registry, repository, and image tags to include in your scans.
Container Security will prioritize matching images to consume available licenses in
subsequently scheduled scans.
Registry Name The name of the registry you want to prioritize in scans.
- 23 -
Option Description
Repository Name The name of the repository you want to prioritize in scans.
Scan Exclusion
Use these fields to specify the registry, repository, and image tags to exclude from your scans.
Container Security will exclude matching images from scans, and will not consume licenses in
subsequently scheduled scans.
Registry Name The name of the registry you want to exclude from scans.
Repository Name The name of the repository you want to exclude from scans.
- 24 -
Scanners
To view your scanners, in the left navigation, click Scanners.
Container Security scanners can scan container images securely without sending the images
outside your organization's network. A scanner takes an initial inventory, or snapshot, of the images
you want to scan. You can then view the scan data for the images.
l A specific image exported from a registry and stored locally on the machine where you install
the scanner.
Add a Scanner
Edit a Scanner
Update a Scanner
Delete a Scanner
Add a Scanner
Create a Container Security scanner:
5. Click Download.
6. Move the scanner to your desired location using the following command:
- 25 -
mv ./consec.tar.gz
chmod +x consec
./consec run
Note: If you are running CI/CD single image scans, you can skip this step. For more
information, see Configure a CI/CD Scan.
What to do next:
l Create a Scan.
Edit a Scanner
To edit a scanner:
2. In the table, right-click the row for the scanner you want to edit, and click Edit.
- 26 -
Update a Scanner
These steps describe how to update a Container Security scanner. When you update a scanner, a
new scanner binary downloads. To start using the new scanner, move the scanner binary to the
location you want to use the scanner.
To update a scanner:
2. In the table, right-click the row for the scanner you want to update, and click Update.
Note: Selecting this option will invalidate the existing scanner key.
4. Select Update to Latest Version to update the scanner to the latest version of Container
Security.
5. Click Download.
6. Move the scanner to your desired location using the following command:
mv ./consec.tar.gz
- 27 -
a. Untar the Container Security CLI using the following command:
chmod +x consec
./consec run
Delete a Scanner
To delete a scanner:
2. In the table, right-click the row for the scanner you want to delete, and click Delete.
3. Click Delete.
- 28 -
Reporting
You can create reports in Container Security to share data with users in other organizations.
Tenable provides reporting through report templates and customizable report formats.
1. In Tenable Enclave Security, in the top navigation bar, click Workspaces > Container
Security.
For more information about reporting, see Reports in the Tenable Security Center user guide.
- 29 -