Anchore Vulnerability Scanning Tools Integrated with GitLab 14

Anchore Vulnerability Scanning Tools Integrated with GitLab 14

Anchore today announced that its open source Grype vulnerability scanner tool is now available in GitLab 14’s container scanning feature. Grype, leveraging Syft libraries, performs a deep inspection of container image contents to create an accurate software bill-of-materials (SBOM) and then produces high-fidelity vulnerability data that can be used to harden the software. This data can be used natively within GitLab workflows and interfaces.

The focus of the GitLab 14 release is to deliver a modern DevOps platform with increased velocity, trust and visibility. The integration of Grype enables security-minded engineers and developers to investigate and remediate vulnerability findings with analysis of the software package.

“We are excited to embed these robust container scanning features of Grype within GitLab’s complete DevOps platform. Our built-in security enables DevOps velocity with confidence and these added features from Anchore bring even greater security for cloud native applications,” said Sam White, Senior Product Manager at GitLab.

Also Read: Reiterating Cybersecurity Strategies to Prevent Account Takeovers

“Grype was selected for this integration based on its ease of use and accuracy of results. This is especially important as we see increased demand from software developers and engineers to protect against rising software supply chain attacks by embedding security early in the development process,” said Neil Levine, Vice President of Product at Anchore. “Organizations who want to gain end-to-end visibility and control over container security can use Grype and Syft in conjunction with Anchore Enterprise.”

Grype provides the transparency and detail necessary to investigate why the image vulnerability is being reported. As part of the integration with GitLab 14, users gain valuable information about the vulnerabilities discovered in order to empower users to triage and remediate them with available patches.

For more such updates follow us on Google News ITsecuritywire News