Profile applicability: Level 2
![]() |
NoteGCR is now deprecated, being superseded by Artifact Registry starting 15th May 2024.
Runtime Vulnerability scanning is available via GKE Security Posture.
|
Scan images stored in Google Container Registry (GCR) or Artifact Registry (AR) for
vulnerabilities.
Vulnerabilities in software packages can be exploited by malicious users to obtain
unauthorized access to local cloud resources. GCR Container Analysis API or Artifact
Registry Container Scanning API allow images stored in GCR or AR respectively to be
scanned for known vulnerabilities.
![]() |
NoteBy default, GCR Container Analysis and AR Container Scanning are disabled.
|
Audit
For Images Hosted in GCR:
Using Google Cloud Console:
- Go to the GCR website.
- Select Settings and check if
Vulnerability scanning
is Enabled.
Using Command Line:
gcloud services list --enabled
Ensure that the
Container Registry API
and Container Analysis API
are listed in the output.For Images Hosted in AR:
Using Google Cloud Console:
- Go to the AR website.
- Select Settings and check if
Vulnerability scanning
is Enabled.
Using Command Line:
gcloud services list --enabled
Ensure that the
Container Scanning API
and Artifact Registry API
are listed in the output.Remediation
For Images Hosted in GCR:
Using Google Cloud Console:
- Go to the GCR website.
- Select Settings under the Vulnerability Scanning heading, click the TURN ON button.
Using Command Line:
gcloud services enable containeranalysis.googleapis.com
For Images Hosted in AR:
Using Google Cloud Console:
- Go to the AR website.
- Select Settings and, under the Vulnerability Scanning heading, click the ENABLE button.
Using Command Line:
gcloud services enable containerscanning.googleapis.com