The containerized environment is fast-paced and constantly changing. With this ever changing landscape comes a new flood of information around the vulnerabilities present in your environment. You aren’t just monitoring infrastructure any more, now you have hosts, images and containers to secure. With so much new information, it can be hard to know where to focus. As a part of our 2.1 Release, we have introduced Twistlock Vulnerability Explorer to help you make sense of it all.
Twistlock Vulnerability Explorer will provide the information you need in a single place (see above) so you will know where you are most vulnerable. It helps you understand your risk at the container, image or host level. The aggregate totals give you a sense of how your risk is distributed and where your vulnerabilities exist. The trend analysis graphs will help you see over time if you are eliminating CVEs from your environments or if there are sudden spikes in a particular resource type that might need attention.
Having the high level picture gives you a great overview of your environment. As you drill down to the next level, mitigation, the Vulnerability Explorer will guide you to your must critical vulnerabilities. Twistlock will show you the top ten most critical vulnerabilities from the image or host perspective ranked using the Twistlock risk score (see below). We introduced the Twistlock Risk Score to help you identify and prioritize the mitigation of your most critical CVEs. It is not a replacement for the CVSS score but serves as an indicator of how risky it is to keep this vulnerability unpatched in the image or host. It takes in to account not only the CVSS score but a whole host of other metrics.
In addition to letting you know which vulnerabilities are most critical Twistlock will show you which resources are affected and where they are located. You will get information about the container name, image and host it is running on (see below).
The top vulnerability table is also filterable by our Collections which allows you to quickly ascertain what your risk may be and how many vulnerabilities any set of images, hosts or containers may have. For example, you could get a specific view into the vulnerability information in your Eastern Region or a view into how vulnerable a microservice may be.
To understand the full risk of a specific CVE, we suggest that you use the search function to quickly find all resources that are affected. This is critical functionality to have when a new vulnerability is making news and you need to know what your exposure is. You can also search for any CVE to get complete information on it’s risk to your environment as well as which containers, images and hosts are vulnerable.
Ultimately, Twistlock Vulnerability Explorer will help you make sense of the sea of vulnerability information that exists in your container environment. It gives you both a high level and in-depth understanding of your entire environment, where your risk is hiding and helps you decide where to act now to improve your security posture.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Lock Down the Kernel to Secure the Container HostRead the Blog
One Chapter Ends, Another BeginsRead the Blog
The Greatest Security Risks Lurking in Your CI/CD PipelineRead the Blog
Cloud Platform Radar: Powerful Cloud Asset IdentificationRead the Blog
Securing Serverless Functions: Visibility with Serverless RadarRead the Blog