Kaspersky Container Security allows detecting misconfigurations in configuration files using the configuration file scanner. This scanner can scan images, file systems, and repositories that contain IaC files (for example, Terraform, CloudFormation, Azure ARM templates, Helm Chart and Dockerfile packages).
Infrastructure as a Code is an approach to managing and describing infrastructure through configuration files instead of manually editing server configurations.
Kaspersky Container Security scans the following configuration files:
The following table lists the types of configuration files and configuration files formats that Kaspersky Container Security supports.
Types and formats of configuration files
File type
File format
Kubernetes
*.yml, *.yaml, *.json
Docker
Dockerfile, Containerfile
Terraform
*.tf, *.tf.json, *.tfvars
Terraform Plan
tfplan, *.tfplan, *.json
CloudFormation
*.yml, *.yaml, *.json
Azure ARM Template
*.json
Helm
*yaml, *.tpl, *.tar.gz
YAML
*.yaml, *.yml
JSON
*.json
In the table in the Resources → Registries → Misconfigurations section, Kaspersky Container Security displays information about object files in which scans have detected misconfigurations. For each object, the table provides the following information:
Name or indication of the file in which misconfigurations were found. Clicking a file name expands the list of configuration errors in the file. You can click the name of the misconfiguration to open a sidebar with the following misconfiguration details:
Misconfiguration name.
On the General tab, the solution displays the description, IaC configuration file type, and the severity level of the misconfiguration. Kaspersky Container Security also indicates the action that must be taken to resolve the detected misconfiguration, and provides links to data sources for this misconfiguration.
IaC configuration file type. The solution indicates the type of infrastructure that the file is suitable for.
Severity level.
Number of risks accepted for the file or misconfiguration.
To customize the display of objects in the table:
Select one or more vulnerability severity levels by clicking the corresponding buttons above the table (Critical, High, Medium, Low, Negligible).
In the IaC type drop-down list, select the type of the IaC configuration file. The following options are available: All (default), kubernetes, dockerfile, terraform, cloudformation.
In the File name column, open the list of misconfigurations for a file.
By default, the list of misconfigurations is collapsed.
The solution also allows finding an object by the name of the file in which misconfigurations were found.