End-of-Life (EoL)

Scan images in Alibaba Cloud Container Registry

Configure Prisma Cloud to scan your Alibaba Cloud Container Registry. First, create a service account, and then specify the scan parameters.

Create a service account

Create a service account so Prisma Cloud can access your registry. Prisma Cloud needs the
AliyunContainerRegistryReadOnly
permission policy to query, download, and scan the images in your registry.
  1. In Alibaba Cloud, create a RAM account.
    Go to
    RAM > Users
    , and click
    Create User
    .
  2. Click
    Add Permissions
    .
  3. Search for
    registry
    , and then select
    AliyunContainerRegistryReadOnly
    .

Scan images in Alibaba Cloud Container Registry

To scan a repository in Alibaba Cloud Container Registry, create a new registry scan setting.
Prerequisites:
  • You’ve installed a Container Defender somewhere in your environment.
  • You’ve already created an Alibaba Cloud Container Registry.
  • You have the service account credentials.
  1. Open Console, and go to 
    Defend > Vulnerabilities > Registry
    .

  2. Click
    Add registry
    .
  3. In the
    Add New Registry Setting Specification
    dialog, enter the following values:
    1. In the
      Version
      drop-down list, select 
      Docker Registry v2
      .
    2. In the
      Registry
      field, enter the Fully Qualified Domain Name (FQDN) for the registry. For example,
      registry-intl.cn-hangzhou.aliyuncs.com
      .
    3. In the
      Repository
      field, enter the name of the repository to scan. Example: 
      library/alpine
      .
    4. In the
      Tag
      field, enter an image tag. Leave this field blank to scan all images, regardless of their tag.
    5. In the
      Credential
      field, configure how Prisma Cloud authenticates with Alibaba Cloud Container Registry.
      Select a credential from the drop-down list. If there are no credentials in the list, click 
      Add new
      , and create a
      Basic authentication
      credential with the service account username and password.
    6. In the
      OS type
      field, specify whether the repo holds
      Linux
      or
      Windows
      images.
    7. In
      Scanner
      , select
      Automatic
      .
      Console automatically selects an available Defender to execute the scan job. Alternatively, you can explicitly select a Defender from the drop-down list. Defenders are listed according to the hosts where they run. For more information, see deployment patterns.
    8. In
      Number of scanners
      , enter the number of Defenders across which scan jobs can be distributed.
    9. In
      Cap
      , limit the number of images to scan.
      Set
      Cap
      to
      5
      to scan the five most recent images, or enter another value to increase or decrease the limit. Set
      Cap
      to
      0
      to scan all images.
    10. Click
      Add
      .
  4. Click the yellow save button.
  5. Verify that the images in the repository are being scanned.
    1. Go to
      Monitor > Vulnerabilities > Registry
      .
      A progress bar shows the status of the current scan. As the scan of each image is completed, its findings are added to the results table.
    2. To get details about the vulnerabilities in an image, click on it.
      To force a specific repository to be scanned again, select it from the drop-down menu on the top right of the results table, then click the
      Scan
      button.

Recommended For You