The Policy Mapping editor creates rules that define which policies and whitelists should be used to perform the policy evaluation of an image based on the registry, repository name and tag of the image. Using the policy editor organizations can set up multiple different policies that will be used on different images based on use case. For example the policy applied to a web facing service may have different security and operational best practices rules than a database backend service.
Mappings are setup based on the Registry, Repository and Tag of an image. Each field supports wildcards.
|registry.example.com||Apply mapping to the registry.example.com|
|anchore/web*||Map any repository starting with web* in the anchore namespace|
In this example an imaged named registry.example.com/anchore/webapi:latest would match this mapping and so the policy and whitelist configured for this mapping would be applied.
The mappings are applied in order, from top to bottom and the system will stop at the first match.
Note: The trusted images and blacklisted images lists take precedence over the mapping. See this document for details.
The empty policy bundle includes no mappings. Press the to add your first mapping.
The Add a New Mapping dialog will be displayed and includes mandatory fields for name, policy, registry, repository and tag. The Whitelist(s) field is optional.
|Name||A unique name to describe the mapping. eg. “Mapping for webapps”|
|Policy||Name of policy to use for evaluation. A drop down will be displayed allowing selection of a single policy|
|Allowlist||Optional: The allowlist(s) to be applied to the image evaluation. Multiple allowlists may be applied to the same image.|
|Registry||The name of the registry to match. Note the name should exactly match the name used to submit the image or repo for analysis eg. foo.example.com:5000 is different to foo.example.com Wildcards are supported. A single * would specify any registry.|
|Repository||The name of the repository, optionally including namespace eg. webapp/foo Wildcards are supported. A single * would specify any repository. Partial names with wildcards are supported. eg. web*/*|
|Tag||Tags mapped by this rule. eg. latest Wildcard are supported. A single * would match any tag. Partial names with wildcards are supported. eg 2018*|
Each entry field includes an indicator showing if the current entry is valid or has errors .
In the screenshot below you can see multiple policy mappings have been defined some of which include one or more allowlists.
Note: As of Anchore Engine 0.2.1 only a single policy can be mapped to an image, however a later version of the engine will support mapping multiple policies to an image. This will simplify policy creation allowing smaller ‘building blocks’ to be assembled together to form a final set of policies rather than require duplication of checks between policies.
Image evaluation is performed sequentially from top to bottom. The system will stop at the first match so particular care should be paid to the ordering.
Mappings can be reordered using the buttons which will move a mapping up or down the list. Mappings may be deleted using the button.
Anchore recommends that a final catch all mapping is applied to ensure that all images are mapped to a policy. This catch-all mapping should specify wildcards in the registry, repository and tag field.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.