Supply Chain

Assess Docker Image Security with cnspec

Scan Docker images for security misconfigurations and CVEs using cnspec.

Scan Docker images for CVEs, end-of-life operating systems, and security misconfigurations before pushing them to a registry. cnspec evaluates images against built-in Mondoo policies or your own custom policies, giving you a gate in CI/CD to prevent vulnerable images from reaching production.

Prerequisites

To scan Docker images with cnspec, you must have:

Scan Docker images

Scan Docker images in public or private container registries using their registry name:

cnspec scan docker ubuntu:latest
cnspec scan docker elastic/elasticsearch:7.2.0
cnspec scan docker gcr.io/google-containers/ubuntu:22.04
cnspec scan docker registry.access.redhat.com/ubi8/ubi

Scan options

OptionDescription
--container-proxyHTTP proxy to use for container pulls
--disable-cacheDisable the in-memory cache for images (significantly slows scans)
--discoverEnable discovery of nested assets (all, auto, container, container-images)
--asset-nameOverride the asset name
--annotationAdd an annotation to the asset (key=value)
--incognitoRun in incognito mode (do not report results to Mondoo Platform)
-o, --outputSet the output format (compact, full, json, junit, summary, yaml)
-f, --policy-bundlePath to a policy file (local path, s3:// URI, or http(s):// URL)
--policySpecify policies to execute (requires --policy-bundle)
--risk-thresholdExit with status 1 if any risk meets or exceeds this value (0-100)
--sudoElevate privileges with sudo

Learn more

On this page