-
Feature Request
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
-
None
Business Problem:
Customers have their taxonomy strategy in the image name, that able to security teams to identify the owner and team owner. Today, the Red Hat Advanced Cluster Security vulnerability management with collections is possible to create reports based on deployment, namespace, and cluster name, but name the image name with regex.
Use Cases:
Security teams need to filter vulnerabilities by image naming conventions (taxonomy) to identify the responsible team quickly in the CSV Report section.
Key Functionality:
Extend Vulnerability Management Collections to support image name regex filtering.
Benefits:
Less manual effort needed to correlate vulnerabilities with ownership