More Info:

Image Vulnerability scanning should be enabled for Amazon ECR container images after being pushed to a repository. Amazon ECR image scanning helps in identifying software vulnerabilities in your container images. Amazon ECR uses the Common Vulnerabilities and Exposures (CVEs) database from the open-source Clair project and provides a list of scan findings.

Risk Level

Informational

Address

Security, Operational Maturity

Compliance Standards

AWSWAF, HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration “Image Vulnerability Scanning Should Be Enabled For Amazon ECR” for AWS using AWS console, follow these steps:

  1. Open the AWS Management Console and navigate to the Amazon Elastic Container Registry (ECR) service.

  2. Click on the repository for which you want to enable image vulnerability scanning.

  3. In the repository details page, click on the “Edit” button.

  4. Under the “Image scanning” section, check the box next to “Enable image vulnerability scanning”.

  5. Choose the scan on push option to enable scanning of images when pushed to the repository or choose the scan on schedule option to enable scanning of images on a schedule.

  6. Under the “Scan schedule” section, choose the frequency of scanning based on your requirements.

  7. Click on the “Save” button to save the changes.

  8. Once image vulnerability scanning is enabled, ECR will scan all images pushed to the repository for vulnerabilities and generate findings that can be viewed in Amazon ECR Console or Amazon EventBridge.

  9. You can also configure Amazon SNS notifications to receive alerts for new findings.

By following these steps, you will be able to remediate the misconfiguration “Image Vulnerability Scanning Should Be Enabled For Amazon ECR” for AWS using AWS console.

Additional Reading: