SlideShare a Scribd company logo
1 of 27
Anchore Enterprise 5.5 - Adapting to
the new normal at NVD
Neil Levine
VP of Product
Anchore
Alan Pope
Director of DevRel
Anchore
Housekeeping
01
02
03
All participant lines are muted
Questions will be accepted throughout, enter questions via Q&A panel
You will receive a follow-up email with a link to the recording
04 Please respond to poll questions as they are appear on your screen
Agenda
Introductions
01
02 Vulnerability Feeds & NVD Challenges
03 Anchore Vulnerability Feed Service & Enhancements in 5.5
04 Q&A
Vulnerability Feeds
Anchore Enterprise: How it Works
Anchore Enterprise
Run
Deploy
Stage
Build
Source
Runtime
SCM CI/CD Registry
Docker v2
API
Admission
controller
AnchoreCTL AnchoreCTL
Enterprise Capabilities
● Linux and Windows containers
● Malware & secrets scanning in
addition to vulnerabilities
● Fully-supported integrations
with CI/CD tools
● Continuous scanning from
develop to runtime
● Persist SBOMs and security
results across apps and teams
● Enhanced vulnerability feed
● Centralized policy enforcement
with pre-built policy packs
● API/GUI for reporting and
auditing
● Notifications
● Remediation recommendations
& workflows
● Enterprise control with support
for RBAC, SSO, LDAP
● SLA Technical Support
K8S
Inventory
EKS
Inventory
Policy Enforcement | Compliance
Vulnerabilities
SBOM Management
Analyzers
Analyzers Analyzers Analyzers Analyzers
Reporting | Auditing
Malware | Secrets False Positive Mgmt Remediation
Anchore Enterprise: How it Works
Anchore Enterprise
Run
Deploy
Stage
Build
Source
Runtime
SCM CI/CD Registry
Docker v2
API
Admission
controller
AnchoreCTL AnchoreCTL
Enterprise Capabilities
● Linux and Windows containers
● Malware & secrets scanning in
addition to vulnerabilities
● Fully-supported integrations
with CI/CD tools
● Continuous scanning from
develop to runtime
● Persist SBOMs and security
results across apps and teams
● Enhanced vulnerability feed
● Centralized policy enforcement
with pre-built policy packs
● API/GUI for reporting and
auditing
● Notifications
● Remediation recommendations
& workflows
● Enterprise control with support
for RBAC, SSO, LDAP
● SLA Technical Support
K8S
Inventory
EKS
Inventory
Policy Enforcement | Compliance
Vulnerabilities
SBOM Management
Analyzers
Analyzers Analyzers Analyzers Analyzers
Reporting | Auditing
Malware | Secrets False Positive Mgmt Remediation
Vulnerability Data Sources
[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vecto
rString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","accessVector":"NETWORK","accessCo
mplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","in
tegrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":7.1},"baseS
everity":"HIGH","exploitabilityScore":
8.6,"impactScore":6
.9,"acInsufInfo":fal
se,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivile
ge":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"
nvd@nis
t.gov","type":"Primary","description":[{"lang":"en","value":"CWE-189"}]}],"co
nfigurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulner
able":true,"criteria":"
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*","m
atchCriteriaId":"9E86E13
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
GitHub
NVD
Debian
Python
NPM
Vulnerability Data Sources
{"name":"CVE-2024-3094","priority":"
critical","patches":[{"distro":"focal","s
tatus":"not-affected","version":"
5.2.4-1ubuntu1.1","package":"xz-utils","prio
rity":null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubunt
u1","package":"xz-utils","priority":null},{"distro":"mantic","status":"not-af
fected","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored
_patches":[{"distro":"upstream","status":"needs-triage","version":null,"packa
ge":"xz-utils","priority":null},{"distro":"trusty/esm","status":"not-affected
","version":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/x
enial","status":"not-affected","version":null,"package":"
xz-utils","priority"
:null},{"distro":"esm-infra/bionic","status":"not-affected","version":null,"p
ackage":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
GitHub
Debian
Python
NPM
Unreliable Data Sources
{"name":"CVE-2024-3094","priority":"
critical","patches":[{"distro":"focal","s
tatus":"not-affected","version":"
5.2.4-1ubuntu1.1","package":"xz-utils","prio
rity":null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubunt
u1","package":"xz-utils","priority":null},{"distro":"mantic","status":"not-af
fected","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored
_patches":[{"distro":"upstream","status":"needs-triage","version":null,"packa
ge":"xz-utils","priority":null},{"distro":"trusty/esm","status":"not-affected
","version":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/x
enial","status":"not-affected","version":null,"package":"
xz-utils","priority"
:null},{"distro":"esm-infra/bionic","status":"not-affected","version":null,"p
ackage":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
NVD
GitHub
Debian
Python
NPM
Missing & Erroneous Data
{"name":"CVE-2024-3094","priority":"
high","patches":[{"distro":"focal","statu
s":"not-affected","version":"
5.2.5-2ubuntu1","package":"xz-utils","priority":
null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubuntu1","p
ackage":"xz-utils","priority":null},{"distro":"mantic","status":"not-affected
","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored_patch
es":[{"distro":"upstream","status":"needs-triage","version":null,"package":"
x
z-utils","priority":null},{"distro":"
trusty/esm","status":"not-affected","ver
sion":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/xenial"
,"status":"not-affected","version":null,"package":"
xz-utils","priority":null}
,{"distro":"esm-infra/bionic
","status":"not-affected","version":null,"package
":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
NVD
GitHub
Debian
Python
NPM
NVD Challenges
NVD (NIST)
CVE Program (MITRE)
Product Owner
Vuln Researcher
Vulnerability Discovered Vulnerability Discovered
Vulnerability Submitted to
CVE Numbering Authority
Published to National
Vulnerability Database
Vulnerability Intake
Vulnerability Triage
Needs More
info/
Provides
additional
info
Vuln
Confirmed
Report Vulnerability
Affected Products
Vulnerability Type
Attack Type
Impact
Provide Additional Details
Bug Bounty Payment
Bounty Payment Received
Reserve CVE
Assign Vuln
CVE
CVE-YYYY-XXX
XX
CVE
Rejected
Needs More Info
Vulnerability Remediation
Coordinated Disclosure
Vulnerability Notification
Coordinated Disclosure
Populate CVE List
CVE Approved
NVD Analyst Assigned
NVD Enrichment
Reference Tags
CVSS
CWE
CPE
Senior Analyst Review
Changes at NVD
NVD (NIST)
CVE Program (MITRE)
Product Owner
Vuln Researcher
Vulnerability Discovered Vulnerability Discovered
Vulnerability Submitted to
CVE Numbering Authority
Published to National
Vulnerability Database
Vulnerability Intake
Vulnerability Triage
Needs More
info/
Provides
additional
info
Vuln
Confirmed
Report Vulnerability
Affected Products
Vulnerability Type
Attack Type
Impact
Provide Additional Details
Bug Bounty Payment
Bounty Payment Received
Reserve CVE
Assign Vuln
CVE
CVE-YYYY-XXX
XX
CVE
Rejected
Needs More Info
Vulnerability Remediation
Coordinated Disclosure
Vulnerability Notification
Coordinated Disclosure
Populate CVE List
CVE Approved
NVD Analyst Assigned
NVD Enrichment
Reference Tags
CVSS
CWE
CPE
Senior Analyst Review
Anchore Vuln Feed Updates
Anchore Vulnerability Feed
Proxy Mode
Anchore sources vulnerability feeds and makes them available to customers
Enabled on a per-feed driver basis
List of known false positives
Anchore sources missing CPE data from NVD records from other sources
(Does not include Severity/CVSS)
Exclusion
Data Feed
Enriched
Data Feed
New in
5.5!
New in
5.5!
Existing Data Source Feed Options
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Direct mode
Direct mode
Direct mode
Direct mode
Exclusion Data Feed
Proxy Mode (5.5+)
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Direct mode
Direct mode
Direct mode
Direct mode
Enriched Data Feed
Exclusion Data Feed
Proxy Mode + Enriched Data (5.5+)
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Proxy mode + Enriched Data
Exclusion Data Feed
Customer Benefits
Proxy Mode
Fewer distractions from 3rd party service outages
No API tokens or service registration
Simple firewall configuration
Fewer false positives due to imprecise vulnerability metadata
Ensures NVD catalog is up to date with CVE records
CPE data missing from NVD records provided by Anchore
Exclusion
Data Feed
Enriched
Data Feed
Enhancing Data Quality
Vulnerability
Providers
CVE5
NVD
Anchore Open Source
Vulnerability Data Tools
+
Human
Review
Anchore
Enterprise
3rd
Party
Products
Get Involved
Anchore Open Source
github.com/anchore
Open Source NVD Enrichment Project
github.com/anchore/vulnerability-data-tools
Enriched NVD Data
github.com/anchore/nvd-data-overrides
Anchore Community Slack
anchore.com/slack
Other New Features
Recent updates
Global CVE
References
Use CVE references in policy or searches independent
of record which generated the match alert
Download the AnchoreCTL client from an
Enterprise API endpoint to ensure version consistency
Simplify authentication for non-human users
AnchoreCTL
Endpoint
Token-based
Auth
New in
5.5!
Summary
1. NVD’s future continues to be uncertain
2. The Anchore Vulnerability Feed helps mitigate some of the data gaps
3. The Anchore Vulnerability Feed simplifies the operations of feed management
4. Customers should enable all feeds for the most accurate results
Next Steps
Get started with a free-trial Anchore Enterprise
https://get.anchore.com/free-trial/
Learn more about Anchore Enterprise
https://anchore.com/platform
Visit our GitHub and Community Slack
github.com/anchore and https://anchore.com/slack
Download the NVIDIA case study
www.anchore.com/nvidia
Thank you for joining!
Schedule a demo of our platform @ get.anchore.com/demo-request

More Related Content

Similar to Adapting to the new normal at NVD with Anchore Vulnerability Feed

Similar to Adapting to the new normal at NVD with Anchore Vulnerability Feed (20)

Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
 
Modernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-ArchitectModernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-Architect
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
07 Outsource To India Independent Testing
07 Outsource To India Independent Testing07 Outsource To India Independent Testing
07 Outsource To India Independent Testing
 
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
 
Connect Remotely Using Windows® 7 Direct Access
Connect Remotely Using Windows® 7 Direct AccessConnect Remotely Using Windows® 7 Direct Access
Connect Remotely Using Windows® 7 Direct Access
 
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
DOES14 - Gary Gruver - Macy's - Transforming Traditional Enterprise Software ...
 
SV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptxSV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptx
 
Continuous Delivery with a PaaS Application
Continuous Delivery with a PaaS ApplicationContinuous Delivery with a PaaS Application
Continuous Delivery with a PaaS Application
 
Sarathi_Resume_June 2016
Sarathi_Resume_June 2016Sarathi_Resume_June 2016
Sarathi_Resume_June 2016
 
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Creating Complete Test Environments in the Cloud: Skytap & Parasoft Webinar
Creating Complete Test Environments in the Cloud: Skytap & Parasoft WebinarCreating Complete Test Environments in the Cloud: Skytap & Parasoft Webinar
Creating Complete Test Environments in the Cloud: Skytap & Parasoft Webinar
 
RoadMap in the Cloud (2011)
RoadMap in the Cloud (2011)RoadMap in the Cloud (2011)
RoadMap in the Cloud (2011)
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 

Recently uploaded

Recently uploaded (20)

The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Adapting to the new normal at NVD with Anchore Vulnerability Feed