Overview
Overview
Container images that carry exploitable vulnerabilities create software supply-chain risk before the workload is even deployed. Reviewing vulnerable images directly helps platform teams block unsafe artifacts earlier in the release path and clean up registries that keep known-bad images available.
Remediation guidance
Review the affected image versions, rebuild them on patched base images, update vulnerable packages, and republish the fixed digests. Remove or quarantine deprecated image tags so downstream workloads cannot keep pulling known-vulnerable artifacts.
Query logic
These are the stored checks tied to this control.
GCP container images with exploitable high or critical vulnerabilities
Connectors
Covered asset types
Expected check: eq []
{ ContainerImagesWithExploitableVulnerabilities { ...AssetFragment } }
Google Cloud