Skip to content

Vulnerability Scanning

Kupe Cloud automatically scans every workload running in your managed cluster for security issues. You don’t need to install anything — scanning is built into the platform and results appear in your console under Security.

CategoryWhat It ChecksExample Finding
VulnerabilitiesKnown CVEs in your container imagesCVE-2024-21626 in runc (CRITICAL, CVSS 8.6)
Config AuditKubernetes manifest misconfigurationsContainer running as root, missing resource limits
RBACOverly permissive role bindingsClusterRole with wildcard verb access
Exposed SecretsHardcoded credentials in imagesAWS access key found in /app/config.yaml
InfrastructureNode and infrastructure securityKubelet API exposed without authentication
SBOMSoftware Bill of Materials per imageFull component inventory with licenses

Scans run automatically when you deploy or update a workload, and again every 6 hours.

Navigate to Security in the console sidebar. You’ll see two sections:

Three views of CVE data across all your workloads:

  • CVE — Every unique vulnerability found, sorted by severity score. Shows which images and workloads are affected, whether a fix is available, and links to the CVE database.
  • Resources — Your workloads listed with vulnerability counts broken down by severity (critical, high, medium, low). Click any workload to see its full scan report.
  • Images — Your container images with aggregated vulnerability counts. Useful for identifying which base images need updating.

Security posture checks across your cluster resources:

  • Infra — Infrastructure-level security assessments
  • Resources — Configuration audit results for your Kubernetes manifests (e.g., missing security contexts, privileged containers)
  • RBAC — Permission analysis showing overly broad role bindings. Toggle “Failed checks” to focus on issues that need attention.
  • Secrets — Exposed credentials detected in your container images, filtered to show only findings with actual issues.

You deploy a workload

Platform scans

your containers

Reports created

automatically

Results appear in

Security console

When you deploy a workload to your managed cluster:

  1. The platform detects the new or updated pods
  2. Container images are scanned for known vulnerabilities (CVEs)
  3. Kubernetes manifests are checked against security best practices
  4. Results are stored and immediately visible in the console

Scans are continuous — if a new CVE is published that affects one of your images, it will appear in your next scheduled scan (within 6 hours).

Review critical and high severity findings regularly. The vulnerability table is sorted by CVSS score by default, so the most impactful issues appear first.

For each finding:

SeverityAction
Critical (CVSS 9.0+)Update the affected image as soon as possible
High (CVSS 7.0-8.9)Plan to update in your next release cycle
Medium (CVSS 4.0-6.9)Review and address when practical
Low (CVSS 0.1-3.9)Informational — no immediate action needed

If a vulnerability shows “Fixed: Yes”, check the “Fix in version” column and update your dependency or base image to that version.

The platform applies these defaults to keep scan results actionable:

  • Severity filter: CRITICAL and HIGH are always surfaced; MEDIUM and LOW are included but sorted lower
  • Unfixed CVEs: Skipped — if no fix exists yet, the finding is suppressed to reduce noise
  • Scan frequency: On every workload change + every 6 hours

You cannot disable scanning for your cluster. Security scanning is a platform-enforced policy.

Reports are tied to your workloads:

  • Deploy a new workload → scan runs automatically, reports appear within minutes
  • Update a workload → new scan runs, old reports are replaced
  • Delete a workload → reports are automatically cleaned up

You never need to manually manage scan reports.