Skip to main content

About the Security Center (Alpha)

This topic provides an overview of the Replicated Security Center.

note

The Security Center is Alpha. To get access to the Security Center, reach out to your Replicated account representative.

Overview

The Security Center helps you strengthen security enablement in your application delivery process by making it easier for both you and your enterprise customers to monitor security risks, assess known vulnerabilities, and view security information for each application release.

The Security Center is powered by Replicated’s SecureBuild technology. With SecureBuild, every image is scanned continuously (not just at release time) using the open source vulnerability scanner grype.

The Security Center surfaces the results of image scans in both the Vendor Portal and the Enterprise Portal so that your customers can see the same security information that you do for each application version. This results in greater transparency, reduced security questionnaire burden, and the adoption of newer, more secure versions of your application.

Requirements

  • Access to the Security Center Alpha requires a feature flag be turned on for your team. For more information, reach out to your Replicated account representative.

  • Version 1.9.0 or later of the Replicated SDK is required to report CVE information from specific customer instances back to the Vendor Portal. For more information, see Customer-Specific CVE Information below.

    • For Helm CLI installations, additionally set the Replicated SDK to Report All Images. This ensures that the Security Center reports all container images observed in the cluster. This settting is enabled by default for Embedded Cluster installations.
  • Each Helm chart in the release must have a unique HelmChart custom resource. The HelmChart custom resource is required for both Embedded Cluster and Helm CLI installations in online (internet-connected) or air-gapped environments to create the list of images that are scanned and reported on in the Security Center.

    note

    For Embedded Cluster and air gap installations, you do not need to make any changes to your existing HelmChart custom resource(s) to support Security Center image scanning.

    For Helm CLI installations in online environments, note that only the HelmChart chart.name and chart.chartVersion fields are required to support Security Center image scanning for the given chart. For example:

    apiVersion: kots.io/v1beta2
    kind: HelmChart
    metadata:
    name: examplechart
    spec:
    chart:
    # name must match the name of the chart
    name: examplechart
    # chartVersion must match the version of the chart
    chartVersion: 1.0.0

Limitations

  • The Security Center is Alpha. The features and functionality of the Security Center are subject to change.

  • Security Center reporting is available only for Embedded Cluster and Helm CLI installations. It is not available for kURL installations or for KOTS installations in an existing cluster.

  • If you have configured the builder key in any of the HelmChart custom resources in your release, note that the Security Center uses the Helm values provided in the builder key to create the list of images that are scanned and reported on for the given Helm chart. The Security Center will scan and report on this same list of images for both air gap and online installations. If there are any images that you want reported on in the Security Center, ensure that they are exposed by the values provided in the builder key.

Vendor Portal Security Center Interfaces

Security Center Dashboard

The Security Center dashboard is available in the Vendor Portal at [App name] > Security.

The following shows an example of the Security Center dashboard:

Security Center dashboard

View a larger version of this image

You can filter for the information on the Security Center dashboard by release type (Linux/Embedded Cluster or Helm) and release channel. The information displayed on the Security Center dashboard applies to the currently promoted release of the selected type on the selected channel.

The Security Center dashboard includes the following:

  • An overview of vulnerabilities present in the release, including a breakdown of CVE severity (Critical, High, Medium, Low) and a detailed list of the top security risks
  • On the Container images tab, a complete list of scanned images with vulnerability counts per image
  • On the CVE details tab, for each CVE identified:
    • The CVE identifier and description
    • The CVSS score and severity rating
    • A list of images affected by the CVE
    • Fixed versions (when available)

Release-Specific CVE Information

CVE details are available for all current and previously promoted application release versions. To view CVE information for a specifc release, go to Releases > [Release Version] > Security.

Customer-Specific CVE Information

You can view CVE details at the customer level for active instances running the Replicated SDK verson 1.9.0 or later. This gives you visibility into all container images running alongside your application, helping you identify security risks and urgent upgrade needs across your customer base.

To view CVE information for a specific customer instance go to Customers > [Customer] > [Instance] > Security.

Enterprise Portal Security Center Interface

The Enterprise Portal Security Center allows you to provide key security information to your enterprise customers alongside your application releases.

The Security Center tab of the Enterprise Portal is not enabled by default. See Enable the Enterprise Portal Security Center. When enabled, the Security Center intelligently filters data based on the customer's installation type, ensuring that customers only see relevant security information.

On the Security Center tab of the Enterprise Portal, for each available release version, customers can:

  • View a CVE report with the complete list of known vulnerabilities and their severity levels
  • View details about the vulnerabilities identified for each image
  • Understand how many CVEs are fixed by upgrading to newer versions
  • Download the Software Bill of Materials (SBOM) in SPDX format for compliance and security audits

The following shows an example of the Security Center dashboard in the Enterprise Portal:

Enterprise Portal Security Center dashboard

View a larger version of this image

Enable the Enterprise Portal Security Center

The Security Center tab in the Enterprise Portal is not enabled by default. If the Security Center feature flag is enabled for your Vendor Portal team, you can optionally enable the Enterprise Portal Security Center tab on a per-customer basis or globally for all customers.

To enable the Security Center tab in a customer's Enterprise Portal, go to Customers > [Customer] > Enterprise Portal access.

To enable the Security Center tab for all customers using the Enterprise Portal, go to Enterprise Portal > Portal Settings > Optional Features and enable the Enable Security Center feature toggle.

Include and Exclude Images From Security Center Scans

You can explicitly include or exclude images from being scanned by the Security Center:

  • To exclude images from being scanned in Helm CLI installations, use the installer-only annotation. This is useful if your application has any charts and resources that are only relevant to Embedded Cluster installations and should not be shown to customers that install with the Helm CLI.

  • If there are any images that are not referenced in the PodSpecs for your application but should be included in Security Center image scans, list those images in the Application custom resource additionalImages field.