This topic gives you an overview of use cases, features, and Common Vulnerabilities and Exposures (CVEs) for Supply Chain Security Tools (SCST) - Scan 1.0
NoteThis topic assumes that you use SCST - Scan 1.0 because, although it is deprecated, it is still the default option in Supply Chain with Testing in this version of Tanzu Application Platform. For more information, see Add testing and scanning to your application.
VMware recommends using SCST - Scan 2.0 instead because SCST - Scan 1.0 will be removed from future versions of Tanzu Application Platform. For more information, see SCST - Scan versions.
With SCST - Scan, you can build and deploy secure trusted software that complies with your corporate security requirements. SCST - Scan provides scanning and gatekeeping capabilities that application and DevSecOps teams can incorporate early in their path to production because it is a known industry best practice for reducing security risk and ensuring more efficient remediation.
For information about the languages and frameworks that are supported by Tanzu Application Platform components, see the Language and framework support table.
The following use cases apply to SCST - Scan:
The following SCST - Scan features enable these use cases:
TaskRuns
.Vulnerability scanning is an important practice in DevSecOps and the benefits of it are widely recognized and accepted, but it has limitations. The following examples illustrate the limits that are prevalent in most scanners today.
One limit of all vulnerability scanners is that no single tool can find all CVEs. Some causes for missed CVEs include:
Vulnerability scanners cannot always access the information to accurately identify whether a CVE exists. This often leads to an influx of false positives where the tool mistakenly flags something as a vulnerability. Unless you specialize in security or are very familiar with a vulnerable component, assessing and determining false positives is a challenging and time-consuming activity. Some causes for a false positive flag include:
Although vulnerability scanning is not a perfect solution, it is an essential part of the process for keeping your organization secure. Scan more continuously and comprehensively to identify and remediate zero-day vulnerabilities quicker by:
Reduce the overall surface area of attack by:
Maintain a central record of false positives to ease CVE triaging and remediation efforts.