FAQ
The following conditions must hold for DTA or VS to pull and scan an image: The ARN must include the image in its scope. These conditions apply to th...
Wed, 15 Apr, 2020 at 11:58 AM
The main differences are: The Aqua Vulnerability Scanning Service supports more threat intelligence sources. The Aqua Vulnerability Scanning Service auto...
Wed, 15 Apr, 2020 at 11:49 AM
The vulnerability scanning process includes these steps: The service pulls an image to Aqua servers. The service analyzes the image to discover the list ...
Wed, 15 Apr, 2020 at 11:52 AM
The DTA scanning process includes these steps: The DTA service pulls an image to Aqua servers. The service spins up a VM. The service runs the image as ...
Wed, 15 Apr, 2020 at 11:52 AM
Yes. Some risks will be detected only if they have an Internet connection. In case a script is downloading malicious payload, it will require an Internet co...
Wed, 15 Apr, 2020 at 11:54 AM
Yes. Even images built internally are often based on external base images and can contain complete packages from open-source repositories. Given recent inci...
Wed, 15 Apr, 2020 at 11:55 AM
In order to scan images, it is required to have the proper permissions to pull them from your account and perform the scanning on our computing resources. T...
Wed, 15 Apr, 2020 at 11:59 AM