copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2021-11-03 |
vulnerabilities, scanning, scans, images, software, catalog |
account |
{{site.data.keyword.attribute-definition-list}}
{: #scans}
Before you install instances of software from the {{site.data.keyword.cloud}} catalog, you might want to complete a vulnerability assessment on the contents of the software and its associated images. By doing so, you can reduce the probability of security threats and unauthorized access of systems. {: shortdesc}
-
Select the software from the catalog in the {{site.data.keyword.cloud_notm}} console.
-
Copy the URL that's displayed in the Source URL section on the Create tab.
-
Generate an IAM access token. If you're working with OVA images, you can skip this step.
To generate an access token by using the {{site.data.keyword.cloud_notm}} CLI, complete the following steps:
- Log in to the CLI:
ibmcloud login
{: pre}
If you're logging in with a federated ID, run the
ibmcloud login --sso
command. For more information, see Logging in with a federated ID. {: note}- Specify the region and resource group in which to create an instance of the software:
ibmcloud target -r <region_name> -g <resource_group_name>
{: pre}
- Retrieve your access token:
ibmcloud iam oauth-tokens
{: pre}
The following truncated example shows a retrieved token.
IAM token: Bearer eyJraWQiOiIyM...
{: screen}
To generate an access token by using an API, complete the following steps:
- Log in to the {{site.data.keyword.cloud_notm}} CLI:
ibmcloud login
{: pre}
If you're logging in with a federated ID, run the
ibmcloud login --sso
command. For more information, see Logging in with a federated ID. {: note}- Specify the region and resource group in which to create an instance of the software:
ibmcloud target -r <region_name> -g <resource_group_name>
{: pre}
- Create an API key:
ibmcloud iam api-key-create <API_key_name> [-d, --description <description>] [--file <API_key_file_name>]
{: pre}
- Retrieve your access token:
curl --location --request GET '<source URL>' \ -- header 'Authorization: bearer <token>' -o <filename>
{: pre}
-
Enter the source URL that you copied in the previous step in the GET request. If you're working with OVA images, you can skip this step.
-
Press Enter to download the source package.
-
Use a vulnerability scanning tool of your choice to review the contents of the software and associated images for any issues.
After you run the scan and address any reported issues, you can return to the console and install the software.