이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 1. Introduction to Vulnerability Management Certification policies
The Vulnerability Management Certification Policy Guide outlines the technical and operational requirements for certifying third-party security scanning products with Red Hat.
Use this guide to certify your scanning solutions in alignment with Red Hat security best practices in jointly supported customer environments.
1.1. Audience 링크 복사링크가 클립보드에 복사되었습니다!
Red Hat offers Vulnerability Management Certification to commercial security vendors that provide container image vulnerability scanning solutions intended for use with Red Hat platforms.
1.2. Overview of the program 링크 복사링크가 클립보드에 복사되었습니다!
The Red Hat Vulnerability Management Certification Program provides a formal process to verify that partner security solutions correctly use Red Hat-provided security data for Red Hat products. This includes CVE metadata, severity ratings, exploitability information (CSAF-VEX), and remediation advisories (RHSA).
Vulnerability management certification is distinct from Red Hat Container Certification. The Container Certification program focuses on verifying container images for supportability and compliance with Red Hat base image requirements.
Red Hat works directly with partners during the certification process to review scanner behavior, metadata handling, and report formatting. Certified products are listed in the Red Hat Ecosystem Catalog, helping establish technical alignment and assurance within the Red Hat ecosystem.
1.3. Create value for customers 링크 복사링크가 클립보드에 복사되었습니다!
The certification process enables partners to confirm that their vulnerability scanning solutions meet Red Hat standards for accuracy, compatibility, and security when assessing Red Hat-published container images and packages.
Red Hat customers benefit from trusted security tools that are tested and jointly supported by Red Hat and the partner, helping them maintain a secure and compliant container environment.
1.4. Vulnerability report format for certification 링크 복사링크가 클립보드에 복사되었습니다!
To conduct a certification review, submit the vulnerability scan results in a standardized CSV format with the following required fields:
- CVE ID
- Package
- Package version
- RH Severity
- RH CVSS (if reported separately from the CVSS field)
- Link or resource or fix information (Use this field to report RHSA)
In addition, the following fields are optional, but will greatly help with the Certification review :
- Container Name
- Container Version Tag
- PURL
The following example illustrates the recommended CSV format:
| Registry | Repository | Container Tag | Image Digest | CVE ID | Package | Red Hat Severity | Red Hat CVSS | Red Hat RHSA Information | Fix Package Information |
|---|---|---|---|---|---|---|---|---|---|
| registry.access.redhat.com | ubi8/python-27 | 2.7-218 | sha256:ef9b8ef384fbb5faf0985914c40839b5b26cb9dd82740ff1255c12a249143534 | CVE-2023-30630 | dmidecode 3.3-4.el8 | Moderate | 7.1 | RHSA-2023:5252 | dmidecode-3.3-4.el8_8.1 |