VMware Tanzu Blobstore Scanning
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
VMware Tanzu Blobstore Scanning
Prisma Cloud for TAS can scan the droplets in your blobstores for vulnerabilities.
Prisma Cloud can be configured to scan your blobstores periodically.
Defenders are the entities that perform the scanning.
When you install Tanzu Application Service (TAS) Defender in your environment, it automatically scans the running apps and hosts in your environment without any special configuration required.
Tanzu stores large binary files in blobstores.
Blobstores are roughly equivalent to registries.
One type of file stored in the blobstore is the droplet.
Droplets are archives that contain ready to run applications.
They are roughly equivalent to container images.
Droplets contain the OS stack, a buildpack (which contains the languages, libraries, and services used by the app), and custom app code.
Before running an app on your infrastructure, the Cloud Controller stages it for delivery by combining the OS stack, buildpack, and source code into a droplet, then storing the droplet in a blobstore.
Configure Prisma Cloud to scan a blobstore
Prisma Cloud can scan both internal and external blobstores, and blobstores configured to use the Fog Ruby gem or WebDAV protocol.
Prequisite:
You’ve already installed TAS Defender in your environment.- Log into Prisma Cloud Console.
- Go toDefend > Vulnerabilities > VMware Tanzu blobstore.
- ClickAdd blobstore.
- InBlobstore location, select if scanning is Local or Remote.Prisma Cloud allows you to scan a blobstore by a Defender within the same TAS environment, or to scan it by a Defender in a remote TAS environment. If the Defender (the Scanner) runs in the same TAS environment as the blobstore, selectLocal. If you want a Defender to scan a blobstore in a different TAS environment, selectRemote.
- InBlobstore’s cloud controller, specify the cloud controller address of the blobstore you want to scan.
- ForRemotescanning:
- (Optional) InFoundation, specify the foundation of the blobstore to scan. The foundation name will then be added as a label to the droplets scanned on this blobstore, which allows you to use it as a criteria for Collections.
- InCredentials, enter the credentials required to access the remote blobstore. If the credentials have already been created in the Prisma Cloud credential store, select it. If not, clickAddto create new credentials.The user role of the credentials you use should be one of the following: Admin, Admin Read-Only, Global Auditor, Org Manager, Space Auditor, Space Developer, or Space Manager. For non-admin users, the cloud_controller.read scope is also required.
- (Optional) InCA certificate, enter a CA certificate in PEM format.
- InScanner’s cloud controlles, specify the cloud controller address of the TAS environment where the scanning Defender is located.
- InScanner, specify a Defender to execute the scanning.Prisma Cloud lists all the agentIDs where Defender is installed. To correlate the agentID to the Diego cell’s IP address, and determine which host runs a Defender, log into any Diego cell, and inspect /var/vcap/instance/dns/records.json. This file shows the correlation between agentID and host IP address.
- InApplication name, specify the droplets to scan. Wildcards are supported only at the beginning and at end of the application name. To scan all droplets, enter a single wildcard (*).
- InCap, specify the maximum number of droplets to scan. To scan all droplets, enter 0.
- ClickAdd.
- ClickSave.
Review scan reports
Scan reports show all vulnerabilities found in the droplets in your blobstores.
By default, droplets are rescanned every 24 hours.
A droplet, which is an artifact of the app staging process, contains the minimum required data to specify an app (binaries/libraries).
Droplets are stored in blobstores.
Review scan reports for droplets in
Monitor > Vulnerabilities > VMware Tanzu blobstore
.When an application is run in a Diego cell, it’s run on top of a stack, currently cflinuxfs3, which is derived from Ubuntu Bionic 18.04.
Defender automatically scans all running applications (buildpack and docker).
Review the scan reports for running apps in
Monitor > Vulnerabilities > Images
.If you compare the findings for a buildpack app in
Monitor > Vulnerabilities > VMware Tanzu blobstore
and Monitor > Vulnerabilities > Images
, you’ll notice a difference in the number of findings.
Remember that Monitor > Vulnerabilities > Images
reports any additional findings in the app’s underlying stack that would not be found in the droplet alone.When TAS stages Docker-based apps, it doesn’t stage an associated droplet in the blobstore.
Therefore, blobstore scanning alone won’t cover Docker-based apps.
If you’re running Docker containers in TAS, and you want to scan the images before they run, then configure Prisma Cloud to scan the container registry.
- Log into Prisma Cloud Console.
- Go toMonitor > Vulnerabilities > VMware Tanzu blobstoreto see a list of summary reports for each droplet.
- To drill into a specific scan report, click on a row in the table.