Container Vulnerability Response
-
- UpdatedFeb 1, 2024
- 9 minutes to read
- Washington DC
- Security Operations
The ServiceNow® Container Vulnerability Response application imports container vulnerable items (CVITs) and according to the rules enables you to remediate container vulnerabilities. Vulnerability data is pulled from internal and external sources, such as the National Vulnerability Database (NVD) or third-party integrations.
Starting with version 18.0 of Vulnerability Response, you can monitor and remediate CVITs in Vulnerability Manager Workspace and IT Remediation Workspace respectively. For more information, see Vulnerability Manager Workspace and Exploring the IT Remediation Workspace.
Request apps on the Store
Visit the ServiceNow Store website to view all the available apps and for information about submitting requests to the store. For cumulative release notes information for all released apps, see the ServiceNow Store version history release notes.
Benefits
- Integrates with third-party container security products, like Prisma Cloud Compute from Palo Alto Networks.
- Imports vulnerability data for the images that are deployed to runtime, and enriches the vulnerability data with runtime contextual information (hosts, Kubernetes clusters, services, and namespaces).
- Provides a list of the references created from vulnerabilities to the relevant Kubernetes entities in the Configuration Management Database (CMDB) using ServiceNow Kubernetes Discovery.
- Offers a comprehensive reporting dashboard, providing insights into the vulnerability and remediation trends.
Key features
- Point to source Docker Image from CVITs instead of running containers.
- Configure granularity of CVITs to track at image, Kubernetes cluster, namespace, or service level.
- Track new image versions to identify fixed vulnerabilities. Any vulnerabilities reported in older versions are automatically resolved in ServiceNow when new image versions are deployed at runtime.
- Track CVITs in Base images separately from Application images to enable independent remediation.
- Raise exception requests or false positive requests, which can be reviewed through a multi-level approver process.
- Define exception rules to defer CVITs automatically.
Use cases
- Runtime context
- Vulnerabilities in container images can be discovered by scanning the image in the following stages of the application life cycle.
- Stage 1: When images are being built in the CI/CD pipeline.
- Stage 2: When images are published to the registry
- Stage 3: When images are deployed to runtime.
While it’s important to identify vulnerabilities as early as possible in stage 1 and stage 2, performing a scan on those images that are deployed to a runtime environment is equally important. It offers the following benefits:- Identifying any new common vulnerabilities and exposures (CVEs) that got published.
- Providing accurate visibility into the risk posture of applications deployed.
- Prioritizing of vulnerabilities that must be resolved. The runtime context in terms of the application services or business services impacted due to a vulnerability can help with prioritization.
Container Vulnerability Response integrates with container security products such as Prisma Cloud Compute from Palo Alto Networks to pull the vulnerability data for those images that are deployed to runtime and enriches the vulnerability data with the runtime contextual information such as hosts, Kubernetes clusters, services, and namespaces where these container images are deployed. Customers using the ServiceNow Kubernetes discovery can see the references created from vulnerabilities to the relevant Kubernetes entities in their Configuration Management Database (CMDB). In addition to enriching the metadata, ServiceNow also offers a comprehensive reporting dashboard to provide insights into the vulnerability and remediation trends.
- Identify ownership
- Pre-requisites
Kubernetes metadata and references: For Container Vulnerability Response to populate Kubernetes metadata (namespace, cluster, and so on) and references to Configuration Management Database (CMDB) entries, you must implement the Kubernetes discovery from Information Technology Operations Management (ITOM). Kubernetes discovery populates Docker Image, the running Docker Containers, Pods, Kubernetes Clusters, and so on, in the CMDB. Container Vulnerability Response identifies the Docker Image in CMDB based on image ID, and then identifies the related Kubernetes entities and populates the references to those entities from vulnerable items.
- Cloud metadata and Docker Image labels: Container Vulnerability Response also populates Docker Image labels, cloud account IDs, regions where an image is deployed. This data is maintained in “Discovered Container Image” record associated with the vulnerable item. There are no pre-requisites for this data to be populated. Container Vulnerability Response uses the data returned by container security products (for example, Palo Alto Prisma Cloud Compute) to populate these entries.
- Track vulnerabilities in the base images
- Pre-requisites
For ‘Base Image’ property to be populated in Container Vulnerability Response, base images must be configured explicitly in the Vulnerability Response Integration with Palo Alto Networks Prisma Cloud Compute console. For more information on how to configure base images in Prisma Cloud, see https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin- compute/vulnerability_management/base_images.
Container Vulnerability Response enables for the creation of separate vulnerability records for a base layer so that they can be assigned to a different team.
Track vulnerabilities identified in a base OS image such as Alpine from the vulnerabilities detected in other layers of the container image. Many organizations have dedicated teams who are responsible for patching base OS images and making them available for all the application teams.
- Define granularity for vulnerable items
- Pre-requisites
Configure the granularity of CVITs by navigating to
. - Identify impacted services using tag-based service identification
- Pre-requisites
- Identify various services in your application and define the tags/ key-value pairs that represent those services.
- Deploy Docker Images and Kubernetes pods with those tags or labels.
- Deploy ITOM Kubernetes Discovery Define 'Tag-based Services' with the right tags or labels.
- Deploy ITOM Kubernetes Discovery
- Define 'Tag-based Services' with the right tags or key-value pairs.
- Import vulnerability data into ServiceNow using Container Vulnerability Response
- Tracking Vulnerabilities
- Setting remediation targets
ServiceNow enables vulnerability managers to define ‘Remediation target rules’ to be able to define service level agreements (SLAs) for fixing vulnerabilities found in container images. Remediation target date can be defined based on a condition/criterion on image metadata or vulnerability information. Remediation owners receive email communication on the vulnerabilities that are approaching the due date.
- Manage exceptions
Application teams or remediation owners for the vulnerabilities might need the ability to request for an exception due to the following reasons.
- A mitigation control is already in place
- Risk accepted
- Awaiting maintenance window to push the fix.
ServiceNow enables security admins to define multiple levels of approvers for exception requests. You can also define auto exception rules that can be used to defer automatically vulnerabilities matching a given condition.
What's new
To learn more about what's new and what's changed in Washington DC, see the Washington DC release notes.
Get started
- For an overview about Security Operations in your Now Platform instance, see Understanding Security Operations.
- For information about all the Security Operations applications available for download from the ServiceNow Store, see Security Operations and the ServiceNow Store.