IBM Cloud Docs
Scanning software for vulnerabilities

Scanning software for vulnerabilities

Before you install instances of software from the IBM Cloud® catalog, you might want to complete a vulnerability assessment on the contents of the software and its associated images. By doing so, you can reduce the probability of security threats and unauthorized access of systems.

Before you begin

You need to install the IBM Cloud CLI. For more information, see Getting started with the IBM Cloud CLI.

Scanning software for vulnerabilities

To scan for software vulnerabilities, you need to use the IBM Cloud CLI after you select your software from the catalog.

  1. From the IBM Cloud catalog, select the software.

  2. Click View details on the software's product page.

  3. Copy the Catalog source URL.

  4. Run the ibmcloud login command to log in to the CLI:

    ibmcloud login
    

    If you're logging in with a federated ID, run the ibmcloud login --sso command. For more information, see Logging in with a federated ID.

  5. Run the ibmcloud oath-tokens command to retrieve your access token. If you're working with OVA images, you can skip this step.

    ibmcloud iam oauth-tokens
    

    The following truncated example shows a retrieved token.

    IAM token:  Bearer eyJraWQiOiIyM...
    
  6. Copy the access token.

  7. Run the curl command with the software's source URL and your access token to download the source package. The filename is what you want to name the file on your computer.

    curl --location --request GET '<source URL>' --header 'Authorization: bearer <token>' -o <filename>
    
  8. Use a vulnerability scanning tool of your choice to scan the downloaded contents of the software and associated images for any issues.

After you run the scan and address any reported issues, you can return to the console and install the software.