Get Container Scan Results
x-prisma-cloud-target-env: {"permission":"monitorImages","saas":true,"self-hosted":true}
x-public: true
Retrieves container scan reports.
Note: The API rate limit for this endpoint is 30 requests per minute. You'll see an HTTP error response 429 if the limit exceeds.
This endpoint maps to Monitor > Compliance > Images > Deployed in the Console UI.
Refer to the following available options for the fields
query parameters:
- labels
- externalLabels
- cluster
- hostname
- image
cURL Request
Refer to the following example cURL command that retrieves a scan report for all containers:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/json' \
-X GET \
"https://<CONSOLE>/api/v<VERSION>/containers"
Refer to the following example cURL command that retrieves a scan report for a container with the collection <COLLECTION ID>
:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/json' \
-X GET \
"https://<CONSOLE>/api/v<VERSION>/containers?collections=<COLLECTION ID>"
The name query is synonymous with the filter containers text field in the Console UI.
A successful response returns the container scan reports.
Query Parameters
- offset integer
Offsets the result to a specific report count. Offset starts from 0.
- limit integer
Number of reports to retrieve in a page. For PCCE, the maximum limit is 250. For PCEE, the maximum limit is 50. The default value is 50.
- search string
Retrieves the result for a search term.
- sort string
Sorts the result using a key. Refer to the columns in the relevant Prisma Cloud Compute user interface to use them as sort keys.
- reverse boolean
Sorts the result in reverse order.
- collections string[]
Filters the result based on collection names that you have defined in Prisma Cloud Compute.
- provider string[]
Scopes the query by cloud provider.
- accountIDs string[]
Filters the result based on cloud account IDs.
- resourceIDs string[]
Scopes the query by resource ID.
- region string[]
Scopes the query by cloud region.
- fields string[]
Retrieves the fields that you need in a report. Use the list of fields you want to retrieve. By default, the result shows all fields of data.
- hostname string[]
Hosts is used to filter containers by host.
- image string[]
Images is used to filter containers by image name.
- imageId string[]
ImageIDs is used to filter containers by image ids.
- id string[]
IDs is used to filter container by container ID.
- profileId string[]
ProfileIDs is used to filter container by runtime profile ID.
- namespaces string[]
Namespaces are the namespaces to filter.
- firewallSupported boolean
FirewallSupported is used to fetch containers with app firewall supported.
- clusters string[]
Clusters is used to filter containers by cluster name.
- complianceIDs int[]
ComplianceIDs is used to filter containers by compliance IDs.
- agentless boolean
Agentless indicates that we should return only containers that were scanned by an agentless scanner.
- 200
- default
- application/json
- Schema
- Example (from schema)
Schema
- Array [
- _id string
ID is the container ID.
- agentless boolean
Agentless indicates if the result was received by an agentless scanner.
- agentlessScanID integer
AgentlessScanID is the ID of the agentless scan in which the result was received.
- collections string[]
Collections are collections to which this container applies.
firewallProtection object
ProtectionStatus describes the status of the WAAS protection
enabled booleanEnabled indicates if WAAS proxy protection is enabled (true) or not (false).
outOfBandMode waas.OutOfBandModePossible values: [
,Observation,Protection
]OutOfBandMode holds the app firewall out-of-band mode
ports int[]Ports indicates http open ports associated with the container.
supported booleanSupported indicates if WAAS protection is supported (true) or not (false).
tlsPorts int[]TLSPorts indicates https open ports associated with the container.
unprotectedProcesses object[]
UnprotectedProcesses holds the processes that support HTTP/HTTPS without WAAS protection.
Array [port integerPort is the process port.
process stringProcess is the process name.
tls booleanTLS is the port TLS indication.
]- hostname string
Hostname is the hostname on which the container is deployed.
info object
ContainerInfo contains all information gathered on a specific container
allCompliance object
AllCompliance contains data regarding passed compliance checks
compliance object[]
Compliance are all the passed compliance checks.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]enabled booleanEnabled indicates whether passed compliance checks is enabled by policy.
app stringApp is the app that is hosted in the container.
cloudMetadata object
CloudMetadata is the metadata for an instance running in a cloud provider (AWS/GCP/Azure)
accountID stringCloud account ID.
awsExecutionEnv stringAWS execution environment (e.g. EC2/Fargate).
image stringImage name.
labels object[]
Cloud provider metadata labels.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]name stringInstance name.
provider common.CloudProviderPossible values: [
aws,azure,gcp,alibaba,oci,others
]CloudProvider specifies the cloud provider name
region stringInstance region.
resourceID stringUnique ID of the resource.
resourceURL stringServer-defined URL for the resource.
type stringInstance type.
vmID stringAzure unique vm ID.
vmImageID stringVMImageID holds the VM image ID.
cluster stringCluster is the provided cluster name.
clusterType common.ClusterTypePossible values: [
AKS,ECS,EKS,GKE,Kubernetes
]ClusterType is the cluster type
complianceDistribution object
Distribution counts the number of vulnerabilities per type
critical integer.
high integer.
low integer.
medium integer.
total integer.
complianceIssues object[]
ComplianceIssues are all the container compliance issues.
Array [applicableRules string[]Rules applied on the package.
binaryPkgs string[]Names of the distro binary package names (packages which are built from the source of the package).
block booleanIndicates if the vulnerability has a block effect (true) or not (false).
cause stringAdditional information regarding the root cause for the vulnerability.
cri booleanIndicates if this is a CRI-specific vulnerability (true) or not (false).
custom booleanIndicates if the vulnerability is a custom vulnerability (e.g., openscap, sandbox) (true) or not (false).
cve stringCVE ID of the vulnerability (if applied).
cvss floatCVSS score of the vulnerability.
description stringDescription of the vulnerability.
discovered date-timeSpecifies the time of discovery for the vulnerability.
exploit vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
exploits object[]
Exploits represents the exploits data found for a CVE
Array [kind vuln.ExploitKindPossible values: [
poc,in-the-wild
]ExploitKind represents the kind of the exploit
link stringLink is a link to information about the exploit.
source vuln.ExploitTypePossible values: [
,exploit-db,exploit-windows,cisa-kev
]ExploitType represents the source of an exploit
]fixDate int64Date/time when the vulnerability was fixed (in Unix time).
fixLink stringLink to the vendor's fixed-version information.
functionLayer stringSpecifies the serverless layer ID in which the vulnerability was discovered.
gracePeriodDays integerNumber of grace days left for a vulnerability, based on the configured grace period. Nil if no block vulnerability rule applies.
id integerID of the violation.
layerTime int64Date/time of the image layer to which the CVE belongs.
link stringVendor link to the CVE.
packageName stringName of the package that caused the vulnerability.
packageVersion stringVersion of the package that caused the vulnerability (or null).
published int64Date/time when the vulnerability was published (in Unix time).
riskFactors object
RiskFactors maps the existence of vulnerability risk factors
property name*
stringseverity stringTextual representation of the vulnerability's severity.
status stringVendor status for the vulnerability.
templates vuln.ComplianceTemplate[]Possible values: [
PCI,HIPAA,NIST SP 800-190,GDPR,DISA STIG
]List of templates with which the vulnerability is associated.
text stringDescription of the violation.
title stringCompliance title.
twistlock booleanIndicates if this is a Twistlock-specific vulnerability (true) or not (false).
type vuln.TypePossible values: [
container,image,host_config,daemon_config,daemon_config_files,security_operations,k8s_master,k8s_worker,k8s_federation,linux,windows,istio,serverless,custom,docker_stig,openshift_master,openshift_worker,application_control_linux
]Type represents the vulnerability type
vecStr stringTextual representation of the metric values used to score the vulnerability.
vulnTagInfos object[]
Tag information for the vulnerability.
Array [color common.ColorColor is a hexadecimal representation of color code value
comment stringTag comment in a specific vulnerability context.
name stringName of the tag.
]]complianceIssuesCount integer.
complianceRiskScore floatComplianceRiskScore is the container's compliance risk score.
externalLabels object[]
ExternalLabels is the external labels e.g., kubernetes namespace labels.
Array [key stringLabel key.
sourceName stringSource name (e.g., for a namespace, the source name can be 'twistlock').
sourceType common.ExternalLabelSourceTypePossible values: [
namespace,deployment,aws,azure,gcp,oci
]ExternalLabelSourceType indicates the source of the labels
timestamp date-timeTime when the label was fetched.
value stringValue of the label.
]id stringID is the container id.
image stringImage is the canonical image name.
imageID stringImageID is the image id.
imageName stringDeprecated: The image name as stated in the docker run command.
infra booleanInfra represents any container that belongs to the infrastructure.
installedProducts object
InstalledProducts contains data regarding products running in environment TODO #34713: Swarm support was deprecated in Joule, remove swarm node/manager boolean (and related compliance) in Lagrange
agentless booleanAgentless indicates whether the scan was performed with agentless approach.
apache stringApache indicates the apache server version, empty in case apache not running.
awsCloud booleanAWSCloud indicates whether AWS cloud is used.
crio booleanCRI indicates whether the container runtime is CRI (and not docker).
docker stringDocker represents the docker daemon version.
dockerEnterprise booleanDockerEnterprise indicates whether the enterprise version of Docker is installed.
hasPackageManager booleanHasPackageManager indicates whether package manager is installed on the OS.
k8sApiServer booleanK8sAPIServer indicates whether a kubernetes API server is running.
k8sControllerManager booleanK8sControllerManager indicates whether a kubernetes controller manager is running.
k8sEtcd booleanK8sEtcd indicates whether etcd is running.
k8sFederationApiServer booleanK8sFederationAPIServer indicates whether a federation API server is running.
k8sFederationControllerManager booleanK8sFederationControllerManager indicates whether a federation controller manager is running.
k8sKubelet booleanK8sKubelet indicates whether kubelet is running.
k8sProxy booleanK8sProxy indicates whether a kubernetes proxy is running.
k8sScheduler booleanK8sScheduler indicates whether the kubernetes scheduler is running.
kubernetes stringKubernetes represents the kubernetes version.
openshift booleanOpenshift indicates whether openshift is deployed.
openshiftVersion stringOpenshiftVersion represents the running openshift version.
osDistro stringOSDistro specifies the os distribution.
serverless booleanServerless indicates whether evaluated on a serverless environment.
swarmManager booleanSwarmManager indicates whether a swarm manager is running.
swarmNode booleanSwarmNode indicates whether the node is part of an active swarm.
labels string[]Labels are the container labels (https://docs.docker.com/engine/userguide/labels-custom-metadata/).
name stringName is the container name.
namespace stringNamespace is the k8s deployment namespace.
network object
ContainerNetwork contains details about the container network (ports, IPs, type etc...)
ports object[]
Ports are the ports details associated with the container.
Array [container integerContainer is the mapped port inside the container.
host integerHost is the host port number.
hostIP stringHostIP is the host IP.
listening booleanListening indicates whether the port is in listening mode.
nat booleanNAT indicates the port is exposed using NAT.
]networkSettings object
DockerNetworkInfo contains network-related information about a container
ipAddress stringIPAddress is the container IP.
macAddress stringMacAddress is the container MAC.
networks object[]
Networks are the networks the container is connected to.
Array [ipAddress stringIPAddress is the container IP.
macAddress stringMacAddress is the container MAC.
name stringName is the network name.
]ports object[]
Ports are the container network binding that are externally mapped.
Array [containerPort stringContainerPort is the mapped port inside the container.
hostIP stringHostIP is the host IP.
hostPort integerHostPort is the host port.
]processes object[]
Processes are the processes that are running inside the container.
Array [name stringName is a process name.
]profileID stringProfileID is the container profile id.
sizeBytes int64.
startTime date-timeStartTime is the starting time of the container.
- runtimeEnabled boolean
RuntimeEnabled indicates if any runtime rule applies to the container.
- scanTime date-time
ScanTime is the container scan time.
- ]
[
{
"_id": "string",
"agentless": true,
"agentlessScanID": 0,
"collections": [
"string"
],
"firewallProtection": {
"enabled": true,
"outOfBandMode": [
"",
"Observation",
"Protection"
],
"ports": [
0
],
"supported": true,
"tlsPorts": [
0
],
"unprotectedProcesses": [
{
"port": 0,
"process": "string",
"tls": true
}
]
},
"hostname": "string",
"info": {
"allCompliance": {
"compliance": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.111Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
],
"enabled": true
},
"app": "string",
"cloudMetadata": {
"accountID": "string",
"awsExecutionEnv": "string",
"image": "string",
"labels": [
{
"key": "string",
"sourceName": "string",
"sourceType": [
"namespace",
"deployment",
"aws",
"azure",
"gcp",
"oci"
],
"timestamp": "2023-05-27T04:01:51.111Z",
"value": "string"
}
],
"name": "string",
"provider": [
"aws",
"azure",
"gcp",
"alibaba",
"oci",
"others"
],
"region": "string",
"resourceID": "string",
"resourceURL": "string",
"type": "string",
"vmID": "string",
"vmImageID": "string"
},
"cluster": "string",
"clusterType": [
"AKS",
"ECS",
"EKS",
"GKE",
"Kubernetes"
],
"complianceDistribution": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0,
"total": 0
},
"complianceIssues": [
{
"applicableRules": [
"string"
],
"binaryPkgs": [
"string"
],
"block": true,
"cause": "string",
"cri": true,
"custom": true,
"cve": "string",
"cvss": 0,
"description": "string",
"discovered": "2023-05-27T04:01:51.111Z",
"exploit": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
],
"exploits": [
{
"kind": [
"poc",
"in-the-wild"
],
"link": "string",
"source": [
"",
"exploit-db",
"exploit-windows",
"cisa-kev"
]
}
],
"fixDate": 0,
"fixLink": "string",
"functionLayer": "string",
"gracePeriodDays": 0,
"id": 0,
"layerTime": 0,
"link": "string",
"packageName": "string",
"packageVersion": "string",
"published": 0,
"riskFactors": {},
"severity": "string",
"status": "string",
"templates": [
[
"PCI",
"HIPAA",
"NIST SP 800-190",
"GDPR",
"DISA STIG"
]
],
"text": "string",
"title": "string",
"twistlock": true,
"type": [
"container",
"image",
"host_config",
"daemon_config",
"daemon_config_files",
"security_operations",
"k8s_master",
"k8s_worker",
"k8s_federation",
"linux",
"windows",
"istio",
"serverless",
"custom",
"docker_stig",
"openshift_master",
"openshift_worker",
"application_control_linux"
],
"vecStr": "string",
"vulnTagInfos": [
{
"color": "string",
"comment": "string",
"name": "string"
}
]
}
],
"complianceIssuesCount": 0,
"complianceRiskScore": 0,
"externalLabels": [
{
"key": "string",
"sourceName": "string",
"sourceType": [
"namespace",
"deployment",
"aws",
"azure",
"gcp",
"oci"
],
"timestamp": "2023-05-27T04:01:51.111Z",
"value": "string"
}
],
"id": "string",
"image": "string",
"imageID": "string",
"imageName": "string",
"infra": true,
"installedProducts": {
"agentless": true,
"apache": "string",
"awsCloud": true,
"crio": true,
"docker": "string",
"dockerEnterprise": true,
"hasPackageManager": true,
"k8sApiServer": true,
"k8sControllerManager": true,
"k8sEtcd": true,
"k8sFederationApiServer": true,
"k8sFederationControllerManager": true,
"k8sKubelet": true,
"k8sProxy": true,
"k8sScheduler": true,
"kubernetes": "string",
"openshift": true,
"openshiftVersion": "string",
"osDistro": "string",
"serverless": true,
"swarmManager": true,
"swarmNode": true
},
"labels": [
"string"
],
"name": "string",
"namespace": "string",
"network": {
"ports": [
{
"container": 0,
"host": 0,
"hostIP": "string",
"listening": true,
"nat": true
}
]
},
"networkSettings": {
"ipAddress": "string",
"macAddress": "string",
"networks": [
{
"ipAddress": "string",
"macAddress": "string",
"name": "string"
}
],
"ports": [
{
"containerPort": "string",
"hostIP": "string",
"hostPort": 0
}
]
},
"processes": [
{
"name": "string"
}
],
"profileID": "string",
"sizeBytes": 0,
"startTime": "2023-05-27T04:01:51.111Z"
},
"runtimeEnabled": true,
"scanTime": "2023-05-27T04:01:51.111Z"
}
]