이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 1. Introduction to Vulnerability Management Certification policies


The Vulnerability Management Certification Policy Guide outlines the technical and operational requirements for certifying third-party security scanning products with Red Hat.

Use this guide to certify your scanning solutions in alignment with Red Hat security best practices in jointly supported customer environments.

1.1. Audience

Red Hat offers Vulnerability Management Certification to commercial security vendors that provide container image vulnerability scanning solutions intended for use with Red Hat platforms.

1.2. Overview of the program

The Red Hat Vulnerability Management Certification Program provides a formal process to verify that partner security solutions correctly use Red Hat-provided security data for Red Hat products. This includes CVE metadata, severity ratings, exploitability information (CSAF-VEX), and remediation advisories (RHSA).

Note

Vulnerability management certification is distinct from Red Hat Container Certification. The Container Certification program focuses on verifying container images for supportability and compliance with Red Hat base image requirements.

Red Hat works directly with partners during the certification process to review scanner behavior, metadata handling, and report formatting. Certified products are listed in the Red Hat Ecosystem Catalog, helping establish technical alignment and assurance within the Red Hat ecosystem.

1.3. Create value for customers

The certification process enables partners to confirm that their vulnerability scanning solutions meet Red Hat standards for accuracy, compatibility, and security when assessing Red Hat-published container images and packages.

Red Hat customers benefit from trusted security tools that are tested and jointly supported by Red Hat and the partner, helping them maintain a secure and compliant container environment.

1.4. Vulnerability report format for certification

To conduct a certification review, submit the vulnerability scan results in a standardized CSV format with the following required fields:

  • CVE ID
  • Package
  • Package version
  • RH Severity
  • RH CVSS (if reported separately from the CVSS field)
  • Link or resource or fix information (Use this field to report RHSA)

In addition, the following fields are optional, but will greatly help with the Certification review :

  • Container Name
  • Container Version Tag
  • PURL

The following example illustrates the recommended CSV format:

Expand
RegistryRepositoryContainer TagImage DigestCVE IDPackageRed Hat SeverityRed Hat CVSSRed Hat RHSA InformationFix Package Information

registry.access.redhat.com

ubi8/python-27

2.7-218

sha256:ef9b8ef384fbb5faf0985914c40839b5b26cb9dd82740ff1255c12a249143534

CVE-2023-30630

dmidecode 3.3-4.el8

Moderate

7.1

RHSA-2023:5252

dmidecode-3.3-4.el8_8.1

맨 위로 이동
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2025 Red Hat