An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
As per current AKS capabilities, the Image Cleaner feature is supported only for Linux node pools and is not supported for Windows node pools at this time.
The primary reason for this limitation is that Trivy OSS, which is used as the underlying scanner for Image Cleaner, does not support Windows containers. As a result, there is currently no viable open-source scanner available for Windows container images that can be integrated into Image Cleaner workflows.
For ongoing visibility into image health and vulnerabilities, Microsoft Defender for Containers provides vulnerability assessment capabilities across:
- CI/CD pipelines
- Container registries (such as ACR)
- Runtime environments (AKS clusters)
Defender enables continuous assessment of container images and workloads, helping teams periodically review the image versions currently in use and identify known vulnerabilities.
Refer to the official documentation for a complete overview and supporting details: https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-overview?__prettifying=true
Automatic update of image references to approved or latest builds - For automating image updates, the Flux v2 extension supports image update automations, allowing Kubernetes workloads to automatically track and deploy approved or latest container image versions based on defined policies.
This approach helps ensure that deployments stay aligned with validated image versions without manual intervention.
Documentation: https://fluxcd.io/flux/components/image/imageupdateautomations/
Enforcement mechanisms to prevent the use of outdated or vulnerable images
Microsoft Defender for Containers provides gated deployment capabilities, allowing enforcement of security policies during workload deployment.
Using vulnerability metadata, Defender can:
- Audit deployments that use vulnerable images
- Deny deployments based on severity thresholds or policy rules
- This ensures that outdated or non-compliant images are prevented from running in the cluster.
Documentation: https://fluxcd.io/flux/components/image/imageupdateautomations/
Validation that all workloads are running approved and up-to-date images
When Defender for Containers is enabled, customers can centrally monitor:
- All container images running across Defender-enabled subscriptions and AKS clusters Associated vulnerability findings for each workload
- This provides a single view to validate whether workloads are running on the most recent approved images and to identify components that require remediation