Bring your own scanner with Supply Chain Security Tools - Scan 2.0

This topic tells you how to bring your own scanner to use with Supply Chain Security Tools (SCST) - Scan 2.0.

Overview

Supply Chain Security Tools (SCST) - Scan 2.0 includes integrations with Trivy and Grype and examples for the following container image scanning tools:

You might have an existing investment in a scan solution that VMware does not have a published integration with. You can build an integration to your existing scan solution with SCST - Scan 2.0. To use your own scanner:

  1. Create an ImageVulnerabilityScan template that tells Tanzu Application Platform how to run your scanner. See Customize an ImageVulnerabilityScan.
  2. Verify that your ImageVulnerabilityScan is working correctly so that downstream Tanzu Application Platform services work correctly. See Verify an ImageVulnerabilityScan.
  3. Wrap your ImageVulnerabilityScan in a ClusterImageTemplate. The ClusterImageTemplate wraps the ImageVulnerabilityScan and allows the Tanzu Application Platform supply chain to run the scan job. See Author a ClusterImageTemplate for Supply Chain integration.

Prerequisites

You must have the following prerequisites:

  • Provide a Vulnerability Scanner Image with one of the following methods:
    • Use a publicly available image that contains the scanner CLI. For example, the official Aqua image for Trivy from Dockerhub.
    • Build your own image with the scanner CLI, which allows for a more customizable scanning experience. For example, you can create an image with the scanner CLI with any dependencies required to run the scanner CLI and manage your image to meet the Tanzu Application Platform compliance standards.
  • Know how your preferred scanner works. For example, what commands to use to call scan results.
check-circle-line exclamation-circle-line close-line
Scroll to top icon