Sonatype Container Security
Sonatype Container Security is a comprehensive security solution for the entire container build time pipeline; safeguarding your containerized applications by protecting them with unmatched vulnerability detection and automatic policy enforcement during build time.
Integrates within CI/CD pipelines to scan and report CVE vulnerabilities within container images
Scan early in the development process to prevent vulnerable images from deploying
Prerequisites for Sonatype Container Security
MacOS or Linux
A running instance of the docker client
Environment variables as needed
A license is not necessary for using Sonatype Container Security, but if you want to contact Sonatype Technical Support with questions, you must have a specific support agreement in place in addition to the support that's included with your Lifecycle subscription.
Note
Container scanning using Windows OS is not supported. The Azure Devops plugin supports container security build time container: scanning, provided the agent uses macOS or Linux and the other prerequisites are met.
Windows users should refer to Docker Container Analysis)
Scanning with Sonatype Container Security
Sonatype Container Security uses the docker client to analyze the container as a scan target when using a Lifecycle scanner. Environment variables may need to be configured depending on where the image is located and which scanner you use.
Scanning a local image
This will look for an image in your local docker instance and scan it when found. This is useful for scanning images built locally and before pushing them to a registry.
Scanning a local image using the default configuration does not require setting environment variables. Use the container:<image>:<version>
format as the scan target.
container:alpine:3.4
Example with the Sonatype CLI
java -jar nexus-iq-cli*.jar \ -a admin:admin123 \ -i test-app \ -t build \ -s http://localhost:8070 \ container:alpine:3.4
Refer to the Sonatype CLI documentation for parameter details.
Scanning an application along with the container
Analyze an application and container at the same time by specifying both as targets in the CLI command. Use a space between the path to the application and the container.
/app_path container:alpine:3.4
Example with application binary and base container
java -jar nexus-iq-cli*.jar \ -a admin:admin123 \ -i test-app \ -t build \ -s http://localhost:8070 \ ./my_application.war container:alpine:3.4
Scanning a remote image
Include the container's url to scan an image stored on a remote server. We recommend you set the registry's username and password environment variables to authenticate on the remote registry. Credentials are required for private images.
export NEXUS_CONTAINER_IMAGE_REGISTRY_USER=anyuser export NEXUS_CONTAINER_IMAGE_REGISTRY_PASSWORD=xxxxxxxxxxxxxx
java -jar nexus-iq-cli*.jar \ -a admin:admin123 \ -i test-app \ -t build \ -s http://localhost:8070 \ container:http://registry.hub.docker.com/library/alpine:3.4
Running a scan from Jenkins
You need a running instance of Jenkins with the Sonatype Platform plugin installed and configured to run policy evaluations in Jenkins.
For this example, the scanPattern
of container:
is used to target the container.
Create a new pipeline project in Jenkins
Enter and update the example script from below into the Pipeline section
Save the pipeline script and run the build in Jenkins
Once complete, follow the link to the results report
pipeline { agent any stages { stage('Policy') { steps { nexusPolicyEvaluation ( advancedProperties: '', enableDebugLogging: false, failBuildOnNetworkError: false, iqApplication: selectedApplication('test-app'), iqScanPatterns: [ [scanPattern: 'container:http://registry.hub.docker.com/library/alpine:3.4'], [scanPattern: '**/my_application.war'] ], iqStage: 'build', jobCredentialsId: '' ) } } } }
These environment variables are to set the authentication to remote servers.
Environment Variable | Example Value |
---|---|
NEXUS_CONTAINER_IMAGE_REGISTRY_USER | <registry_username> |
NEXUS_CONTAINER_IMAGE_REGISTRY_PASSWORD | <registry_password> |
These environment variables may be set to override the default configuration.
When using the mount path for Sonatype Container, the user requires write permissions to the location specified at the mount path. Write permission to /tmp
is required when the default value is used.
Environment Variable | Default Value |
---|---|
NEXUS_CONTAINER_SCANNING_LICENSE | "" |
NEXUS_CONTAINER_SCANNING_SCANNER_IMAGE | neuvector/scanner |
NEXUS_CONTAINER_SCANNING_REGISTRY_URL | https://registry.hub.docker.com |
NEXUS_CONTAINER_SCANNING_REGISTRY_USER | <dockerhub username> |
NEXUS_CONTAINER_SCANNING_REGISTRY_PASSWORD | <dockerhub password> |
NEXUS_CONTAINER_SCANNING_MOUNT_PATH | /tmp |
NEXUS_CONTAINER_SCANNING_BIND_MOUNT_SHARED | false |
FAQs
How does Sonatype Lifecycle evaluate containers?
Sonatype Lifecycle leverages Sonatype Container Security to directly provide information about your images and registries back in the same familiar Lifecycle report, alongside other application vulnerabilities and evaluation results.
Where can I integrate Sonatype Container Security scanning into my SDLC?
Sonatype Container Security scanning in Lifecycle is currently available in the CLI and the Jenkins, Bamboo CI, and Gitlab CI plugins.
How can I scan with an SELinux image?
Support for the environmental variable NEXUS_CONTAINER_SCANNING_BIND_MOUNT_SHARED
. Setting the property to true will include the ':z'
option in the request allowing the bind mount content to be shared among multiple containers. This is something that is needed when using SELinux
.
Details are found in the Docker documentation.
Why does the component overview page only show one version?
The component overview page only shows one version because NeuVector's provided component identity information does not include other versions of the component data.