你当前正在访问 Microsoft Azure Global Edition 技术文档网站。 如果需要访问由世纪互联运营的 Microsoft Azure 中国技术文档网站,请访问 https://docs.azure.cn。
容器漏洞评估 REST API
概述
Azure Resource Graph (ARG) 提供了一个 REST API,可用于以编程方式访问漏洞评估结果来获取 Azure 注册表和运行时漏洞建议。 详细了解 ARG 引用和查询示例。
Azure、AWS 和 GCP 容器注册表漏洞子评估将作为安全资源的一部分发布到 ARG。 详细了解安全子评估。
ARG 查询示例
要拉取特定子评估,需要使用评估密钥。
- 对于由 MDVM 提供支持的 Azure 容器漏洞评估,密钥为
c0b7cfc6-3172-465a-b378-53c7ff2cc0d5
。 - 对于由 MDVM 提供支持的 AWS 容器漏洞评估,密钥为
c27441ae-775c-45be-8ffa-655de37362ce
。 - 对于由 MDVM 提供支持的 GCP 容器漏洞评估,密钥为
5cc3a2c1-8397-456f-8792-fe9d0d4c9145
。
下面是一个通用安全子评估查询示例,可用作生成查询的示例。 此查询可提取过去一小时内生成的第一个子评估。
securityresources
| where type =~ "microsoft.security/assessments/subassessments" and properties.additionalData.assessedResourceType == "AzureContainerRegistryVulnerability"
| extend assessmentKey=extract(@"(?i)providers/Microsoft.Security/assessments/([^/]*)", 1, id)
| where assessmentKey == "c0b7cfc6-3172-465a-b378-53c7ff2cc0d5"
| extend timeGenerated = properties.timeGenerated
| where timeGenerated > ago(1h)
查询结果 - Azure 子评估
[
{
"id": "/subscriptions/{SubscriptionId}/resourceGroups/{ResourceGroup}/providers/Microsoft.ContainerRegistry/registries/{Registry Name}/providers/Microsoft.Security/assessments/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5/subassessments/{SubAssessmentId}",
"name": "{SubAssessmentId}",
"type": "microsoft.security/assessments/subassessments",
"tenantId": "{TenantId}",
"kind": "",
"location": "global",
"resourceGroup": "{ResourceGroup}",
"subscriptionId": "{SubscriptionId}",
"managedBy": "",
"sku": null,
"plan": null,
"properties": {
"id": "CVE-2022-42969",
"additionalData": {
"assessedResourceType": "AzureContainerRegistryVulnerability",
"vulnerabilityDetails": {
"severity": "High",
"exploitabilityAssessment": {
"exploitStepsPublished": false,
"exploitStepsVerified": false,
"isInExploitKit": false,
"exploitUris": [],
"types": [
"Remote"
]
},
"lastModifiedDate": "2023-09-12T00:00:00Z",
"publishedDate": "2022-10-16T06:15:00Z",
"workarounds": [],
"references": [
{
"title": "CVE-2022-42969",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2022-42969"
},
{
"title": "oval:org.opensuse.security:def:202242969",
"link": "https://ftp.suse.com/pub/projects/security/oval/suse.linux.enterprise.server.15.xml.gz"
},
{
"title": "oval:com.microsoft.cbl-mariner:def:11166",
"link": "https://raw.githubusercontent.com/microsoft/CBL-MarinerVulnerabilityData/main/cbl-mariner-1.0-oval.xml"
},
{
"title": "ReDoS in py library when used with subversion ",
"link": "https://github.com/advisories/GHSA-w596-4wvx-j9j6"
}
],
"weaknesses": {
"cwe": [
{
"id": "CWE-1333"
}
]
},
"cveId": "CVE-2022-42969",
"cvss": {
"2.0": null,
"3.0": {
"cvssVectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"base": 7.5
}
},
"cpe": {
"language": "*",
"softwareEdition": "*",
"version": "*",
"targetHardware": "*",
"targetSoftware": "python",
"vendor": "py",
"edition": "*",
"product": "py",
"update": "*",
"other": "*",
"part": "Applications",
"uri": "cpe:2.3:a:py:py:*:*:*:*:*:python:*:*"
}
},
"artifactDetails": {
"lastPushedToRegistryUTC": "2023-09-04T16:05:32.8223098Z",
"repositoryName": "public/azureml/aifx/stable-ubuntu2004-cu117-py39-torch200",
"registryHost": "ptebic.azurecr.io",
"artifactType": "ContainerImage",
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"digest": "sha256:4af8e6f002401a965bbe753a381af308b40d8947fad2b9e1f6a369aa81abee59",
"tags": [
"biweekly.202309.1"
]
},
"softwareDetails": {
"category": "Language",
"language": "python",
"fixedVersion": "",
"version": "1.11.0.0",
"vendor": "py",
"packageName": "py",
"osDetails": {
"osPlatform": "linux",
"osVersion": "ubuntu_linux_20.04"
},
"fixStatus": "FixAvailable",
"evidence": []
},
"cvssV30Score": 7.5
},
"description": "This vulnerability affects the following vendors: Pytest, Suse, Microsoft, Py. To view more details about this vulnerability please visit the vendor website.",
"displayName": "CVE-2022-42969",
"resourceDetails": {
"id": "/repositories/public/azureml/aifx/stable-ubuntu2004-cu117-py39-torch200/images/sha256:4af8e6f002401a965bbe753a381af308b40d8947fad2b9e1f6a369aa81abee59",
"source": "Azure"
},
"timeGenerated": "2023-09-12T13:36:15.0772799Z",
"remediation": "No remediation exists",
"status": {
"description": "Disabled parent assessment",
"severity": "High",
"code": "NotApplicable",
"cause": "Exempt"
}
},
"tags": null,
"identity": null,
"zones": null,
"extendedLocation": null,
"assessmentKey": "c0b7cfc6-3172-465a-b378-53c7ff2cc0d5",
"timeGenerated": "2023-09-12T13:36:15.0772799Z"
}
]
查询结果 - AWS 子评估
[
{
"id": "/subscriptions/{SubscriptionId}/resourceGroups/{ResourceGroup}/providers/ microsoft.security/ securityconnectors/{SecurityConnectorName}/ securityentitydata/aws-ecr-repository-{RepositoryName}-{Region}/providers/Microsoft.Security/assessments/c27441ae-775c-45be-8ffa-655de37362ce/subassessments/{SubAssessmentId}",
"name": "{SubAssessmentId}",
"type": "microsoft.security/assessments/subassessments",
"tenantId": "{TenantId}",
"kind": "",
"location": "global",
"resourceGroup": "{ResourceGroup}",
"subscriptionId": "{SubscriptionId}",
"managedBy": "",
"sku": null,
"plan": null,
"properties": {
"description": "This vulnerability affects the following vendors: Debian, Fedora, Luatex_Project, Miktex, Oracle, Suse, Tug, Ubuntu. To view more details about this vulnerability please visit the vendor website.",
"resourceDetails": {
"id": "544047870946.dkr.ecr.us-east-1.amazonaws.com/mc/va/eastus/verybigimage@sha256:87e18285c301bc09b7f2da126992475eb0c536d38272aa0a7066324b7dda3d87",
"source": "Aws",
"connectorId": "649e5f3a-ea19-4057-88fd-58b1f4b774e2",
"region": "us-east-1",
"nativeCloudUniqueIdentifier": "arn:aws:ecr:us-east-1:544047870946:image/mc/va/eastus/verybigimage",
"resourceProvider": "ecr",
"resourceType": "repository",
"resourceName": "mc/va/eastus/verybigimage",
"hierarchyId": "544047870946"
},
"additionalData": {
"assessedResourceType": "AwsContainerRegistryVulnerability",
"cvssV30Score": 7.8,
"vulnerabilityDetails": {
"severity": "High",
"exploitabilityAssessment": {
"exploitStepsPublished": false,
"exploitStepsVerified": false,
"isInExploitKit": false,
"exploitUris": [],
"types": []
},
"lastModifiedDate": "2023-11-07T00:00:00.0000000Z",
"publishedDate": "2023-05-16T00:00:00.0000000Z",
"workarounds": [],
"weaknesses": {
"cwe": []
},
"references": [
{
"title": "CVE-2023-32700",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2023-32700"
},
{
"title": "CVE-2023-32700_oval:com.oracle.elsa:def:20233661",
"link": "https://linux.oracle.com/security/oval/com.oracle.elsa-all.xml.bz2"
},
{
"title": "CVE-2023-32700_oval:com.ubuntu.bionic:def:61151000000",
"link": "https://security-metadata.canonical.com/oval/com.ubuntu.bionic.usn.oval.xml.bz2"
},
{
"title": "CVE-2023-32700_oval:org.debian:def:155787957530144107267311766002078821941",
"link": "https://www.debian.org/security/oval/oval-definitions-bullseye.xml"
},
{
"title": "oval:org.opensuse.security:def:202332700",
"link": "https://ftp.suse.com/pub/projects/security/oval/suse.linux.enterprise.server.15.xml.gz"
},
{
"title": "texlive-base-20220321-72.fc38",
"link": "https://archives.fedoraproject.org/pub/fedora/linux/updates/38/Everything/x86_64/repodata/c7921a40ea935e92e8cfe8f4f0062fbc3a8b55bc01eaf0e5cfc196d51ebab20d-updateinfo.xml.xz"
}
],
"cvss": {
"2.0": null,
"3.0": {
"cvssVectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"base": 7.8
}
},
"cveId": "CVE-2023-32700",
"cpe": {
"language": "*",
"softwareEdition": "*",
"version": "*",
"targetSoftware": "ubuntu_linux_20.04",
"targetHardware": "*",
"vendor": "ubuntu",
"edition": "*",
"product": "libptexenc1",
"update": "*",
"other": "*",
"part": "Applications",
"uri": "cpe:2.3:a:ubuntu:libptexenc1:*:*:*:*:*:ubuntu_linux_20.04:*:*"
}
},
"artifactDetails": {
"repositoryName": "mc/va/eastus/verybigimage",
"registryHost": "544047870946.dkr.ecr.us-east-1.amazonaws.com",
"lastPushedToRegistryUTC": "2022-06-26T13:24:03.0000000Z",
"artifactType": "ContainerImage",
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"digest": "sha256:87e18285c301bc09b7f2da126992475eb0c536d38272aa0a7066324b7dda3d87",
"tags": [
"latest"
]
},
"softwareDetails": {
"fixedVersion": "2019.20190605.51237-3ubuntu0.1",
"language": "",
"category": "OS",
"osDetails": {
"osPlatform": "linux",
"osVersion": "ubuntu_linux_20.04"
},
"version": "2019.20190605.51237-3build2",
"vendor": "ubuntu",
"packageName": "libptexenc1",
"fixStatus": "FixAvailable",
"evidence": [
"dpkg-query -f '${Package}:${Source}:\\n' -W | grep -e ^libptexenc1:.* -e .*:libptexenc1: | cut -f 1 -d ':' | xargs dpkg-query -s",
"dpkg-query -f '${Package}:${Source}:\\n' -W | grep -e ^libptexenc1:.* -e .*:libptexenc1: | cut -f 1 -d ':' | xargs dpkg-query -s"
],
"fixReference": {
"description": "USN-6115-1: TeX Live vulnerability 2023 May 30",
"id": "USN-6115-1",
"releaseDate": "2023-05-30T00:00:00.0000000Z",
"url": "https://ubuntu.com/security/notices/USN-6115-1"
}
}
},
"timeGenerated": "2023-12-11T13:23:58.4539977Z",
"displayName": "CVE-2023-32700",
"remediation": "Create new image with updated package libptexenc1 with version 2019.20190605.51237-3ubuntu0.1 or higher.",
"status": {
"severity": "High",
"code": "Unhealthy"
},
"id": "CVE-2023-32700"
},
"tags": null,
"identity": null,
"zones": null,
"extendedLocation": null,
"assessmentKey": "c27441ae-775c-45be-8ffa-655de37362ce",
"timeGenerated": "2023-12-11T13:23:58.4539977Z"
}
]
查询结果 - GCP 子评估
[
{
"id": "/subscriptions/{SubscriptionId}/resourceGroups/{ResourceGroup}/providers/ microsoft.security/ securityconnectors/{SecurityConnectorName}/securityentitydata/gar-gcp-repository-{RepositoryName}-{Region}/providers/Microsoft.Security/assessments/5cc3a2c1-8397-456f-8792-fe9d0d4c9145/subassessments/{SubAssessmentId}",
"name": "{SubAssessmentId}",
"type": "microsoft.security/assessments/subassessments",
"tenantId": "{TenantId}",
"kind": "",
"location": "global",
"resourceGroup": "{ResourceGroup}",
"subscriptionId": "{SubscriptionId}",
"managedBy": "",
"sku": null,
"plan": null,
"properties": {
"description": "This vulnerability affects the following vendors: Alpine, Debian, Libtiff, Suse, Ubuntu. To view more details about this vulnerability please visit the vendor website.",
"resourceDetails": {
"id": "us-central1-docker.pkg.dev/detection-stg-manual-tests-2/hital/nginx@sha256:09e210fe1e7f54647344d278a8d0dee8a4f59f275b72280e8b5a7c18c560057f",
"source": "Gcp",
"resourceType": "repository",
"nativeCloudUniqueIdentifier": "projects/detection-stg-manual-tests-2/locations/us-central1/repositories/hital/dockerImages/nginx@sha256:09e210fe1e7f54647344d278a8d0dee8a4f59f275b72280e8b5a7c18c560057f",
"resourceProvider": "gar",
"resourceName": "detection-stg-manual-tests-2/hital/nginx",
"hierarchyId": "788875449976",
"connectorId": "40139bd8-5bae-e3e0-c640-2a45cdcd2d0c",
"region": "us-central1"
},
"displayName": "CVE-2017-11613",
"additionalData": {
"assessedResourceType": "GcpContainerRegistryVulnerability",
"vulnerabilityDetails": {
"severity": "Low",
"lastModifiedDate": "2023-12-09T00:00:00.0000000Z",
"exploitabilityAssessment": {
"exploitStepsPublished": false,
"exploitStepsVerified": false,
"exploitUris": [],
"isInExploitKit": false,
"types": [
"PrivilegeEscalation"
]
},
"publishedDate": "2017-07-26T00:00:00.0000000Z",
"workarounds": [],
"references": [
{
"title": "CVE-2017-11613",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2017-11613"
},
{
"title": "129463",
"link": "https://exchange.xforce.ibmcloud.com/vulnerabilities/129463"
},
{
"title": "CVE-2017-11613_oval:com.ubuntu.trusty:def:36061000000",
"link": "https://security-metadata.canonical.com/oval/com.ubuntu.trusty.usn.oval.xml.bz2"
},
{
"title": "CVE-2017-11613_oval:org.debian:def:85994619016140765823174295608399452222",
"link": "https://www.debian.org/security/oval/oval-definitions-stretch.xml"
},
{
"title": "oval:org.opensuse.security:def:201711613",
"link": "https://ftp.suse.com/pub/projects/security/oval/suse.linux.enterprise.server.15.xml.gz"
},
{
"title": "CVE-2017-11613-cpe:2.3:a:alpine:tiff:*:*:*:*:*:alpine_3.9:*:*-3.9",
"link": "https://security.alpinelinux.org/vuln/CVE-2017-11613"
}
],
"weaknesses": {
"cwe": [
{
"id": "CWE-20"
}
]
},
"cvss": {
"2.0": null,
"3.0": {
"cvssVectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R",
"base": 3.3
}
},
"cveId": "CVE-2017-11613",
"cpe": {
"version": "*",
"language": "*",
"vendor": "debian",
"softwareEdition": "*",
"targetSoftware": "debian_9",
"targetHardware": "*",
"product": "tiff",
"edition": "*",
"update": "*",
"other": "*",
"part": "Applications",
"uri": "cpe:2.3:a:debian:tiff:*:*:*:*:*:debian_9:*:*"
}
},
"cvssV30Score": 3.3,
"artifactDetails": {
"lastPushedToRegistryUTC": "2023-12-11T08:33:13.0000000Z",
"repositoryName": "detection-stg-manual-tests-2/hital/nginx",
"registryHost": "us-central1-docker.pkg.dev",
"artifactType": "ContainerImage",
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"digest": "sha256:09e210fe1e7f54647344d278a8d0dee8a4f59f275b72280e8b5a7c18c560057f",
"tags": [
"1.12"
]
},
"softwareDetails": {
"version": "4.0.8-2+deb9u2",
"language": "",
"fixedVersion": "4.0.8-2+deb9u4",
"vendor": "debian",
"category": "OS",
"osDetails": {
"osPlatform": "linux",
"osVersion": "debian_9"
},
"packageName": "tiff",
"fixReference": {
"description": "DSA-4349-1: tiff security update 2018 November 30",
"id": "DSA-4349-1",
"releaseDate": "2018-11-30T22:41:54.0000000Z",
"url": "https://security-tracker.debian.org/tracker/DSA-4349-1"
},
"fixStatus": "FixAvailable",
"evidence": [
"dpkg-query -f '${Package}:${Source}:\\n' -W | grep -e ^tiff:.* -e .*:tiff: | cut -f 1 -d ':' | xargs dpkg-query -s",
"dpkg-query -f '${Package}:${Source}:\\n' -W | grep -e ^tiff:.* -e .*:tiff: | cut -f 1 -d ':' | xargs dpkg-query -s"
]
}
},
"timeGenerated": "2023-12-11T10:25:43.8751687Z",
"remediation": "Create new image with updated package tiff with version 4.0.8-2+deb9u4 or higher.",
"id": "CVE-2017-11613",
"status": {
"severity": "Low",
"code": "Unhealthy"
}
},
"tags": null,
"identity": null,
"zones": null,
"extendedLocation": null,
"assessmentKey": "5cc3a2c1-8397-456f-8792-fe9d0d4c9145",
"timeGenerated": "2023-12-11T10:25:43.8751687Z"
}
]
定义
名称 | 描述 |
---|---|
ResourceDetails | 被评估的 Azure 资源的详细信息 |
ContainerRegistryVulnerability | 容器注册表漏洞评估的更多上下文字段 |
CVE | CVE 详细信息 |
CVSS | CVSS 详细信息 |
SecuritySubAssessment | 对资源进行安全子评估 |
SecuritySubAssessmentList | 安全子评估列表 |
ArtifactDetails | 受影响容器映像的详细信息 |
SoftwareDetails | 受影响软件包的详细信息 |
FixReference | 有关修补程序的详细信息(如果可用) |
OS 详细信息 | 有关 os 信息的详细信息 |
VulnerabilityDetails | 有关检测到的漏洞的详细信息 |
CPE | 通用平台枚举 |
Cwe | 常见漏洞枚举 |
VulnerabilityReference | 指向漏洞的参考链接 |
ExploitabilityAssessment | 指向示例攻击的参考链接 |
ContainerRegistryVulnerability (MDVM)
Azure 容器注册表漏洞评估的其他上下文字段
Name | 类型 | 描述 |
---|---|---|
assessedResourceType | string: AzureContainerRegistryVulnerability AwsContainerRegistryVulnerability GcpContainerRegistryVulnerability |
子评估资源类型 |
cvssV30Score | Numeric | CVSS v3 分数 |
vulnerabilityDetails | VulnerabilityDetails | |
artifactDetails | ArtifactDetails | |
softwareDetails | SoftwareDetails |
ArtifactDetails
受影响容器映像的上下文详细信息
Name | 类型 | 描述 |
---|---|---|
repositoryName | 字符串 | 存储库名称 |
RegistryHost | 字符串 | 注册表主机 |
lastPublishedToRegistryUTC | 时间戳 | 上次发布日期的 UTC 时间戳 |
artifactType | 字符串:ContainerImage | |
mediaType | 字符串 | 层媒体类型 |
摘要 | 字符串 | 易受攻击的图像的摘要 |
标记 | 字符串 | 易受攻击的图像的标记 |
软件详细信息
受影响软件包的详细信息
Name | 类型 | 描述 |
---|---|---|
fixedVersion | 字符串 | 已修复的版本 |
category | 字符串 | 漏洞类别 - OS 或语言 |
osDetails | OsDetails | |
language | 字符串 | 受影响包的语言(例如 Python、.NET)也可能为空 |
版本 | 字符串 | |
vendor | 字符串 | |
packageName | 字符串 | |
fixStatus | 字符串 | Unknown、FixAvailable、NoFixAvailable、Scheduled、WontFix |
证据 | 字符串 | 包的证据 |
fixReference | FixReference |
FixReference
有关修补程序的详细信息(如果可用)
Name | 类型 | 说明 |
---|---|---|
ID | 字符串 | 修复 ID |
说明 | 字符串 | 修复说明 |
releaseDate | 时间戳 | 修复时间戳 |
url | 字符串 | 用于修复通知的 URL |
OS 详细信息
有关 os 信息的详细信息
Name | 类型 | 描述 |
---|---|---|
osPlatform | 字符串 | 例如:Linux、Windows |
osName | 字符串 | 例如:Ubuntu |
osVersion | 字符串 |
VulnerabilityDetails
有关检测到的漏洞的详细信息
严重性 | 严重性 | 子评估严重性级别 |
---|---|---|
LastModifiedDate | 时间戳 | |
publishedDate | 时间戳 | 发布日期 |
ExploitabilityAssessment | ExploitabilityAssessment | |
CVSS | 字典 <字符串,CVSS> | 从 cvss 版本到 cvss 详细信息对象的字典 |
解决方法 | 解决方法 | 已发布的漏洞解决方法 |
参考 | VulnerabilityReference | |
缺点 | 弱点 | |
cveId | 字符串 | CVE ID |
Cpe | CPE |
CPE(通用平台枚举)
Name | 类型 | 说明 |
---|---|---|
语言 | 字符串 | 语言标签 |
softwareEdition | 字符串 | |
版本 | 字符串 | 包版本 |
targetSoftware | 字符串 | 目标软件 |
vendor | 字符串 | Vendor |
product | 字符串 | 产品 |
edition | 字符串 | |
update | 字符串 | |
其他 | 字符串 | |
part | 字符串 | 应用程序硬件操作系统 |
uri | 字符串 | CPE 2.3 格式的 URI |
弱点
Name | 类型 | 描述 |
---|---|---|
Cwe | Cwe |
Cwe(常见漏洞枚举)
CWE 详细信息
Name | 类型 | 说明 |
---|---|---|
ID | 字符串 | CWE ID |
VulnerabilityReference
指向漏洞的参考链接
Name | 类型 | 描述 |
---|---|---|
link | 字符串 | 引用 URL |
title | 字符串 | 引用标题 |
ExploitabilityAssessment
指向示例攻击的参考链接
Name | 类型 | 描述 |
---|---|---|
exploitUris | 字符串 | |
exploitStepsPublished | 布尔 | 已发布攻击步骤 |
exploitStepsVerified | 布尔 | 已验证攻击步骤 |
isInExploitKit | 布尔 | 是攻击工具包的一部分 |
types | 字符串 | 攻击类型,例如:NotAvailable、Dos、Local、Remote、WebApps、PrivilegeEscalation |
ResourceDetails - Azure
被评估的 Azure 资源的详细信息
Name | 类型 | 描述 |
---|---|---|
ID | string | 被评估资源的 Azure 资源 ID |
source | 字符串:Azure | 被评估资源所在的平台 |
ResourceDetails - AWS/GCP
被评估的 AWS/GCP 资源的详细信息
Name | 类型 | 描述 |
---|---|---|
id | string | 被评估资源的 Azure 资源 ID |
source | 字符串:Aws/Gcp | 被评估资源所在的平台 |
connectorId | string | 连接器 ID |
区域 | string | 区域 |
nativeCloudUniqueIdentifier | string | 被评估资源的本机云的资源 ID |
resourceProvider | 字符串:ecr/gar/gcr | 被评估的资源提供程序 |
resourceType | string | 被评估的资源类型 |
resourceName | string | 被评估的资源名称 |
hierarchyId | string | 帐户 ID (Aws)/项目 ID (Gcp) |
SubAssessmentStatus
子评估的状态
Name | 类型 | 描述 |
---|---|---|
cause | 字符串 | 评估状态原因的编程代码 |
code | SubAssessmentStatusCode | 评估状态的编程代码 |
description | string | 评估状态的人工可读说明 |
severity | severity | 子评估严重性级别 |
SubAssessmentStatusCode
评估状态的编程代码
Name | 类型 | 描述 |
---|---|---|
正常 | string | 资源运行正常 |
不适用 | string | 未进行此资源的评估 |
不正常 | string | 资源存在需要解决的安全问题 |
SecuritySubAssessment
对资源进行安全子评估
Name | 类型 | 描述 |
---|---|---|
ID | string | 资源 ID |
name | string | 资源名称 |
properties.additionalData | AdditionalData:AzureContainerRegistryVulnerability | 子评估的详细信息 |
properties.category | string | 子评估的类别 |
properties.description | string | 评估状态的人工可读说明 |
properties.displayName | string | 子评估的用户友好显示名称 |
properties.id | string | 漏洞 ID |
properties.impact | string | 此子评估的影响说明 |
properties.remediation | string | 有关如何修正此子评估的信息 |
properties.resourceDetails | ResourceDetails: Azure 资源详细信息 AWS/GCP 资源详细信息 |
已评估的资源的详细信息 |
properties.status | SubAssessmentStatus | 子评估的状态 |
properties.timeGenerated | string | 生成子评估的日期和时间 |
type | string | 资源类型 |
SecuritySubAssessmentList
安全子评估列表
Name | 类型 | 描述 |
---|---|---|
nextLink | string | 用于提取下一页的 URI。 |
value | SecuritySubAssessment | 对资源进行安全子评估 |