standard
turbot/azure_cis

Pipeline: 3.1.4.3 Ensure that 'Agentless container vulnerability assessment' component status is 'On'

Description

Enable automatic vulnerability management for images stored in ACR or running in AKS clusters.

Agentless vulnerability scanning will examine container images - whether running or in storage - for vulnerable configurations.

Remediation

From Azure Portal

  1. From the Azure Portal Home page, select Microsoft Defender for Cloud.
  2. Under Management select Environment Settings.
  3. Select a subscription.
  4. Under Settings > Defender Plans, click Settings & monitoring.
  5. Locate the row for Agentless container vulnerability assessment.
  6. Select On.
  7. Click Continue in the top left.

Repeat the above for any additional subscriptions.

Default Value

By default, Microsoft Defender for Containers is Off. If Defender for Containers is enabled from the Microsoft Defender for Cloud portal, auto provisioning will be enabled.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_cis.pipeline.cis_v300_3_1_4_3

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_cis.pipeline.cis_v300_3_1_4_3
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default

Outputs

This pipeline has no outputs.

Tags

folder = CIS v3.0.0/3 Security/3.1 Microsoft Defender for Cloud/3.1.4 Defender Plan: Containers