0
3.1.4
Yokohama, Xanadu, Washington DC, Vancouver
Import vulnerabilities detected by Prisma Cloud Compute in deployed container images into ServiceNow and enable remediation workflow involving security and application development teams.
Import vulnerabilities detected by Prisma Cloud Compute in deployed container images into ServiceNow and enable remediation workflow involving security and application development teams to prioritize and remediate the most critical vulnerabilities in your container images.
This integration includes the following key feature:
- Data import - The Prisma Cloud Compute Vulnerability Integration executes scheduled jobs that import findings, vulnerable items, and related container images.
- Fixed
- As issue with validating the mapping between clusters and namespaces, when the granularity option is set to "cluster" and "namespace" in ServiceNow, CVITs are created based on the combination of the lists for namespaces and clusters. we are introducing a solution that uses the "host" field to accurately determine the cluster-to-namespace mappings, ensuring proper functionality for different CVIT granularity combinations.
- As issue with validating the mapping between clusters and namespaces, when the granularity option is set to "cluster" and "namespace" in ServiceNow, CVITs are created based on the combination of the lists for namespaces and clusters. we are introducing a solution that uses the "host" field to accurately determine the cluster-to-namespace mappings, ensuring proper functionality for different CVIT granularity combinations.
- The following Security Operations plugins must be installed and activated:
- com.snc.security_support.vul
- com.snc.secops.orchestration
- The following applications must be installed and activated. These applications are available from the Servicenow Store:
- Vulnerability Response application and its dependent plugins
- Vulnerability Response and Configuration Compliance for Containers
- For more information on Vulnerability Response application compatibility, see Vulnerability Response Compatibility Matrix and Release Schema Changes in the Supporting Links and Docs section on this page.
- Permissions and roles:
- System Admin (admin) for installation, and
- Container Vulnerability Admin (sn_vul_container.vulnerability_admin) or admin for configuration