You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/software-supply-chain-assurance/artifact-security/overview.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,11 +29,12 @@ Any artifacts that go through [SBOM Orchestration](/docs/software-supply-chain-a
29
29
The landing page of the Artifacts section provides a comprehensive list of all artifacts, displaying the following details for each:
30
30
31
31
***Name**: The name of the artifact.
32
+
***Artifact Type**: The type of the artifact
32
33
***Digests**: The number of digests associated with the artifact.
33
34
***Environments**: The environments where the artifact has been deployed with the count.
34
35
***Vulnerabilities**: The vulnerabilities identified in the most recent scan of the digest.
35
36
36
-
<DocImage path={require('./static/artifacts-overview-tab.png')} width="100%" height="100%" title="Click to view full size image" />
37
+
<DocImage path={require('./static/artifacts-overview.png')} width="100%" height="100%" title="Click to view full size image" />
37
38
38
39
39
40
#### Search and filter options
@@ -100,11 +101,12 @@ The SBOM tab presents details of all the dependencies within the artifact, inclu
100
101
***Package Manager:** Tool managing the package.
101
102
***PURL:** Package URL.
102
103
***Supplier:** Source of the dependency.
104
+
***Vulnerabilities:** Shows the number of issues for each SBOM component, grouped by severity levels (Critical, High, Medium, Low) as identified through the Snyk scan.
103
105
104
-
<DocImage path={require('./static/scs-sbomtab.png')} width="100%" height="100%" title="Click to view full size image" />
106
+
<DocImage path={require('./static/sbom-tab.png')} width="100%" height="100%" title="Click to view full size image" />
105
107
106
108
107
-
For more information about the levels of image dependencies, refer to the "[Label Components from Image](/docs/software-supply-chain-assurance/how-to-guides/label-components-from-image)" documentation.
109
+
For more information about the levels of image dependencies, refer to the [How to detect base images in SBOM](/docs/software-supply-chain-assurance/how-to-guides/label-components-from-image) documentation.
Copy file name to clipboardExpand all lines: docs/software-supply-chain-assurance/open-source-management/generate-sbom-for-artifacts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,6 +161,12 @@ This example **Deploy** stage has two steps:
161
161
</details>
162
162
163
163
164
+
### View vulnerabilities in the SBOM
165
+
166
+
167
+
After you run the SBOM orchestration step followed by the STO Snyk scan, the [SBOM tab](/docs/software-supply-chain-assurance/artifact-security/overview#sbom-tab) on the Artifacts page displays vulnerabilities for the components identified by Snyk. This helps you effectively identify and prioritize open source risks
168
+
169
+
164
170
### Publish SBOM
165
171
166
172
After you run the SBOM Orchestration step, you can download or publish SBOM through multiple ways depending on your workflow:
Copy file name to clipboardExpand all lines: docs/software-supply-chain-assurance/open-source-management/generate-sbom-for-repositories.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,6 +129,11 @@ This example **Deploy** stage has two steps:
129
129
130
130
</details>
131
131
132
+
133
+
### View vulnerabilities in the SBOM
134
+
135
+
After you run the SBOM orchestration step followed by the STO Snyk scan, the [SBOM tab](/docs/software-supply-chain-assurance/artifact-security/overview#sbom-tab) on the Artifacts page displays vulnerabilities for the components identified by Snyk. This helps you effectively identify and prioritize open source risks
136
+
132
137
### Publish SBOM
133
138
134
139
After you run the SBOM Orchestration step, you can download or publish SBOM through multiple ways depending on your workflow:
0 commit comments