1. Overview

Configure Prisma Cloud to scan your Alibaba Cloud Container Registry. First, create a service account, and then specify the scan parameters.

2. Create a service account

Create a service account so Prisma Cloud can access your registry. Prisma Cloud needs the AliyunContainerRegistryReadOnly permission policy to query, download, and scan the images in your registry.

  1. In Alibaba Cloud, create a RAM account.

    Go to RAM > Users, and click Create User.

    scan alibaba create user
  2. Click Add Permissions.

    scan alibaba set perms
  3. Search for registry, and then select AliyunContainerRegistryReadOnly.

3. Scan images in Alibaba Cloud Container Registry

To scan a repository in Alibaba Cloud Container Registry, create a new registry scan setting.

Prerequisites:

  • You’ve installed a Container Defender somewhere in your environment.

  • You’ve already created an Alibaba Cloud Container Registry.

  • You have the service account credentials.

  1. Open Console, and go to Defend > Vulnerabilities > Registry.


  2. Click Add registry.

  3. In the Add New Registry Setting Specification dialog, enter the following values:

    1. In the Version drop-down list, select Docker Registry v2.

    2. In the Registry field, enter the Fully Qualified Domain Name (FQDN) for the registry. For example, registry-intl.cn-hangzhou.aliyuncs.com.

    3. In the Repository field, enter the name of the repository to scan. Example: library/alpine.

    4. In the Tag field, enter an image tag. Leave this field blank to scan all images, regardless of their tag.

    5. In the Credential field, configure how Prisma Cloud authenticates with Alibaba Cloud Container Registry.

      Select a credential from the drop-down list. If there are no credentials in the list, click Add new, and create a Basic authentication credential with the service account username and password.

    6. In the OS type field, specify whether the repo holds Linux or Windows images.

    7. In Scanner, select Automatic.

      Console automatically selects an available Defender to execute the scan job. Alternatively, you can explicitly select a Defender from the drop-down list. Defenders are listed according to the hosts where they run. For more information, see deployment patterns.

    8. In Number of scanners, enter the number of Defenders across which scan jobs can be distributed.

    9. In Cap, limit the number of images to scan.

      Set Cap to 5 to scan the five most recent images, or enter another value to increase or decrease the limit. Set Cap to 0 to scan all images.

    10. Click Add.

  4. Click the yellow save button.

    save button
  5. Verify that the images in the repository are being scanned.

    1. Go to Monitor > Vulnerabilities > Images > Registries.

      A progress indicator at the top right of the window shows the status of the current scan. As the scan of each image is completed, its findings are added to the results table.

    2. To get details about the vulnerabilities in an image, click on it.

      To force a specific repository to be scanned again, select Scan from the top right of the results table, then click on the specific registry to rescan.