Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-8357

Add RHACS Support for Detecting and Scanning OCI Image Volumes (OpenShift 4.20)

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • rhacs, rhacs-scanner
    • None
    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Goal Summary

      OpenShift 4.20 introduces support for mounting Open Container Initiative (OCI) compliant images or artifacts directly into pods using image volumes. This allows workloads to access files from an OCI registry without embedding them in the base image.
      Currently, RHACS does not detect or classify this volume type, showing it as unknown. This RFE requests adding native RHACS support to identify, scan, and control OCI image volumes.

      Goals and Expected User Outcomes
      • RHACS should recognize and display OCI image volumes as a specific type (e.g., imageVolume).
      • Security teams gain visibility into which pods use OCI image volumes and from which registries.
      • Policies and admission controls can be extended to validate and block untrusted or unsigned OCI references.
      • RHACS vulnerability scanning should be extended to analyze the contents of OCI image volumes, including binaries (e.g., Go executables), JAR files, and libraries, ensuring no vulnerable or unapproved components are introduced through mounted images.

      Acceptance Criteria
      • OCI-based volumes (volumes.image.reference) are detected and labeled as imageVolume.
      • RHACS UI and API show the registry, image reference, and mount path.
      • Policies can restrict usage to trusted registries or signed images.
      • RHACS Scanner can inspect OCI volume contents for known vulnerabilities in binaries, JARs, and libraries.

      Success Criteria / KPIs
      • 100% of pods using OCI image volumes are detected.
      • Admission control blocks policy violations (e.g., untrusted sources).
      • Vulnerability scans successfully detect issues in mounted OCI volume content.

      Use Case Example
       
      https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/nodes/index#nodes-pods-image-volume

       
      Currently, RHACS shows:

      Type: unknown

      This allows OCI-mounted content to bypass both detection and vulnerability scanning, introducing potential security blind spots.

              sbadve@redhat.com Shubha Badve
              ralvares@redhat.com Rodrigo Alvares
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                None
                None