Find out which clusters host containers with vulnerabilities detected by Runtime Scanning.
Runtime Scanning can detect vulnerabilities in your existing clusters. Once a
vulnerability is detected on a container, the detection displays. Switch between the
Kubernetes and ECS tabs to view the
desired results.
The following table outlines the actions available in the Vulnerabilities tab.
Action
|
Description
|
Filter the displayed data
|
Use the Filter by and
Severity drop-downs to locate specific
vulnerabilities in the list.
|
Locate the affected clusters
|
Click the Cluster link to redirect and locate
the cluster in Container Inventory.
|
View CVE information
|
Select a detection in the list and click the CVE link under the table
to view more information about the CVE in the National Vulnerability Database.
|