Images Screen: Suppression Rules (tab)
This feature is not Generally Available yet. You can refer to this document only if your Aqua environment is enabled with the feature, Suppression of image vulnerabilities. If you are interested to experience this, please contact Aqua Support for enabling the feature.
The Images page > Suppression Rules tab displays all the suppression rules created on the image vulnerabilities. You can create a new suppression rule in this tab to suppress the specific vulnerabilities automatically as soon as they are detected after scanning the images. The vulnerabilities eligible for suppression are determined based on the criteria and scope set in the suppression rule. After you create the suppression rules, you can disable or delete them to stop suppressing new image vulnerabilities in future which meet the suppression criteria and scope set in the rule.
When you create a suppression rule, vulnerabilities for suppression will be determined based on the following configurations:
- Suppression Criteria: On setting this, the vulnerabilities which meet the criteria will be suppressed
- Suppression scope: Application scopes and Additional scope criteria define the vulnerabilities to which the suppression rule will be applied
If a vulnerability is suppressed by a rule, the same vulnerability detected in other images in the same repository will also be suppressed with the same expiration.
When you create a suppression rule for the image vulnerabilities, you can optionally set an expiration (between 1 and 999 days from the present time) for the suppressions. Suppression expiration can give image developers a "grace period" for providing a more durable solution for mitigating the risk of vulnerabilities.
Create a suppression rule
- Navigate to the Images page > Suppression Rules tab.
2. At the top right side of the page, click Create Suppression Rule. The Create new vulnerability suppression dialog appears.
3. Suppression Criteria: In the Suppression Criteria section, enable the required options and enter the values to set the criteria:
- All vulnerabilities with CVSS score: Enable it if required and select the vulnerability score range between 1 and 10
- All vulnerabilities with fix available: Enable it if required to filter the vulnerabilities which have a fix available from the software vendor
- Specific vulnerability with CVE ID: Enable it if required and to add multiple CVE IDs, add each CVE ID and press the Enter button
- All vulnerabilities with severity: Enable it if required and select one or multiple severities from the dropdown menu
The AND operator is applied between the options selected above.
4. Suppression Scope: To add application scopes and (optional) additional scope criteria: see Policy scope editing.
5. Suppression Properties: Enter the following details for the suppression rule:
- Suppression Rule Name
6. Suppression period: Enable the checkbox and select the number of days that you want to apply the suppression rule.
7. Click Create.
In the Suppression Rules tab, you can perform the following actions on the suppression rules that were created earlier:
- Disable: In the Enable/Disable column, you can disable any suppression rule. You can also disable multiple suppression rules by selecting the required suppression rules and click Disable at the top right side of the page. This action will stop suppressing any new vulnerabilities meeting the criteria set in the rules. Vulnerabilities suppressed earlier as per the disabled rule will continue to be suppressed until the expiration period.
- Delete: Select the required suppression rules and click Delete at the top right side of the page. This action will stop suppressing any new vulnerabilities and delete the suppression rules and their configurations permanently. Vulnerabilities suppressed earlier as per the deleted rule will be unsuppressed.
Did you find it helpful? Yes NoSend feedback