FAQ

Why only part of the images being scanned from the registry?
The following conditions must hold for DTA or VS to pull and scan an image: The ARN must include the image in its scope. These conditions apply to th...
Wed, 15 Apr, 2020 at 11:58 AM
Differences between Aqua VS and the AWS image scanning for ECR
The main differences are: The Aqua Vulnerability Scanning Service supports more threat intelligence sources. The Aqua Vulnerability Scanning Service auto...
Wed, 15 Apr, 2020 at 11:49 AM
How does the vulnerability scanning process work?
The vulnerability scanning process includes these steps: The service pulls an image to Aqua servers. The service analyzes the image to discover the list ...
Wed, 15 Apr, 2020 at 11:52 AM
How does the DTA scanning process work?
The DTA scanning process includes these steps: The DTA service pulls an image to Aqua servers. The service spins up a VM. The service runs the image as ...
Wed, 15 Apr, 2020 at 11:52 AM
Does images get an Internet connection during DTA scanning?
Yes. Some risks will be detected only if they have an Internet connection. In case a script is downloading malicious payload, it will require an Internet co...
Wed, 15 Apr, 2020 at 11:54 AM
Do I need DTA if my organization is using only internally built images?
Yes. Even images built internally are often based on external base images and can contain complete packages from open-source repositories. Given recent inci...
Wed, 15 Apr, 2020 at 11:55 AM
Why is an ARN needed?
In order to scan images, it is required to have the proper permissions to pull them from your account and perform the scanning on our computing resources. T...
Wed, 15 Apr, 2020 at 11:59 AM