Defender for Cloud offers customers the capability to remediate vulnerabilities in container images while they're still stored in the registry. Additionally, it conducts contextual analysis of the vulnerabilities in your environment, aiding in prioritizing remediation efforts based on the risk level associated with each vulnerability.
The recommendation details page opens with additional information. This information includes details about your registry image and the remediation steps.
Select the Findings tab to see the list of vulnerabilities impacting the registry image.
Select each vulnerability for a detailed description of the vulnerability, additional images affected by that vulnerability, information on the software version that contributes to resolving the vulnerability, and links to external resources to help with patching the vulnerability.
To find all images impacted by a specific vulnerability, group recommendations by title. For more information, see Group recommendations by title.
Demonstrate the skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.