Information about detected misconfigurations

Kaspersky Container Security allows detecting misconfigurations in configuration files using the configuration file scanner. This scanner can scan images, file systems, and repositories that contain IaC files (for example, Terraform, CloudFormation, Azure ARM templates, Helm Chart and Dockerfile packages).

Kaspersky Container Security scans the following configuration files:

The following table lists the types of configuration files and configuration files formats that Kaspersky Container Security supports.

Types and formats of configuration files

File type

File format

Kubernetes

*.yml, *.yaml, *.json

Docker

Dockerfile, Containerfile

Terraform

*.tf, *.tf.json, *.tfvars

Terraform Plan

tfplan, *.tfplan, *.json

CloudFormation

*.yml, *.yaml, *.json

Azure ARM Template

*.json

Helm

*yaml, *.tpl, *.tar.gz

YAML

*.yaml, *.yml

JSON

*.json

In the table in the Resources → Registries → Misconfigurations section, Kaspersky Container Security displays information about object files in which scans have detected misconfigurations. For each object, the table provides the following information:

To customize the display of objects in the table:

  1. Select one or more vulnerability severity levels by clicking the corresponding buttons above the table (Critical, High, Medium, Low, Negligible).
  2. In the IaC type drop-down list, select the type of the IaC configuration file. The following options are available: All (default), kubernetes, dockerfile, terraform, cloudformation.
  3. In the File name column, open the list of misconfigurations for a file.

    By default, the list of misconfigurations is collapsed.

The solution also allows finding an object by the name of the file in which misconfigurations were found.

Page top