Anchore Enterprise Feeds

Overview

Anchore Enterprise Feeds is an On-Premises service that supplies operating system and non-operating system vulnerability data and package data for consumption by Anchore Engine. Policy Engine, a service component of Anchore Engine, uses this data for finding vulnerabilities and evaluating policies. For more information about how Anchore Engine manages feed data, see Feeds Overview.

Anchore maintains a public and free feed service at https://ancho.re/v1/service/feeds which is used by open source Anchore Engine. Anchore Enterprise Feeds offers the following benefits over the free service:

  • Vulnerability data from 3rd party licensed feeds.
  • Run Anchore Enterprise in Air-Gapped mode.
  • Examine updates to vulnerability dataset (for audit trail) with advanced APIs.
  • Granular control and configuration over feed data due to On-Premises installation. Configure how often the data from external sources is synced, enable/disable individual drivers responsible for processing normalized data.

Design

Anchore Enterprise Feeds have three high-level components:

  • Drivers – Communicate with upstream sources and fetch data and normalize it for Anchore.
  • Database – Stores the current state of the normalized data for serving via API.
  • API – Serves the data to clients, supporting update-only fetches.

Drivers

A driver downloads raw data from an external source and normalizes it. Each driver outputs normalized data for one of the four feed types - (os) vulnerabilities, packages, nvd or third party feeds.

  • Drivers responsible for operating system package vulnerabilities gather raw data from the respective os resources listed below.
  • Package drivers process the official list of packages maintained by NPM and RubyGems organizations.
  • The nvdv2 driver processes CVEs from the NIST database, and supplies normalized data that is used for matching non-os packages such as Java, Python, NPM, GEM, NuGet.
  • Third-party drivers source vulnerability data for software artifacts, curated by the third party. Policy Engine may prioritize third-party data matches over other feed data sources when available for matching vulnerabilities against software artifacts.

All drivers except for the package drivers are enabled by default. The service has configuration toggles to enable/disable each driver individually and tuning driver specific settings.

Driver Feed Type External Data Source
suse vulnerabilities https://www.suse.com/support/security/oval/
alpine vulnerabilities https://github.com/alpinelinux/alpine-secdb/archive/master.tar.gz
rhel vulnerabilities https://access.redhat.com/hydra/rest/securitydata/cve.json
centos (deprecated) vulnerabilities https://www.redhat.com/security/data/oval/com.redhat.rhsa-all.xml.bz2
debian vulnerabilities https://security-tracker.debian.org/tracker/data/json https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/DSA/list
oracle vulnerabilities https://linux.oracle.com/security/oval/com.oracle.elsa-all.xml.bz2
ubuntu vulnerabilities https://launchpad.net/ubuntu-cve-tracker
amzn vulnerabilities https://alas.aws.amazon.com/AL2/
gem packages https://s3-us-west-2.amazonaws.com/rubygems-dumps
npm packages https://replicate.npmjs.com
github github https://github.com
nvd (deprecated) nvd (deprecated) https://nvd.nist.gov/vuln/data-feeds
nvdv2 nvdv2 https://nvd.nist.gov/feeds/json/cve/1.1/
msrc microsoft https://api.msrc.microsoft.com/
third-party third-party https://data.anchore-enterprise.com

Database

Normalized vulnerability and package data is persisted in the database. In addition, the execution state and updates to the data set are tracked in the database.

API

Anchore Enterprise Feeds expose a RESTful API. It accepts client requests and serves normalized data accordingly. Policy Engine is one of the clients using this API to sync the feed data. For more information about API access, see Anchore Enterprise Feeds Advanced APPI Access.

Configuration

See Feeds to read about installation requirements for an air-gapped deployment and optional configuration of drivers.

Last modified March 24, 2022