Container Image Vulnerability Detected
Security Monitoring is now available Security Monitoring is now available
<  Back to rules search

Container Image Vulnerability Detected

Set up the twistlock integration.

Overview

Goal

Detect vulnerabilities in container images.

Strategy

This rule lets you monitor Twistlock logs to detect Critical severity vulnerabilities in a container image.

Triage & Response

  1. Determine the impact of this vulnerability.
  2. Update the container image in the registry with a patched version of the software.
  3. Deploy the new image to all containers running the vulnerable image.