DEV Community πŸ‘©β€πŸ’»πŸ‘¨β€πŸ’»

Learn2Skills for AWS Community Builders

Posted on • Updated on

Log Container image scan from Amazon ECR in CloudWatch

In order to pull the scan findings from ECR, a DescribeImageScanFindings API call is used by the AWS Lambda function, which will be triggered each time a scan is completed by ECR. A log group is created for each repository with the name format β€˜/aws/ecr/image-scan-findings/repo-name’. Then, the findings for each image inside the repository will be sorted by severity. A log stream will be created for each severity found on this image (β€˜LOW’, β€˜MEDIUM’, etc.), in addition to a summary log stream for all of the findings count. The Lambda function finally puts the sorted findings to the corresponding log stream.

Solution overview:

  1. A client (could be a user or machine) triggers a scan for an image. This can be done manually (using the AWS Management Console, CLI, or SDK), or after the push of an image to the repository that has scan on push enabled.
  2. Amazon ECR scans the image. After the scan is complete, an event is sent to Amazon EventBridge confirming the completion of the scan.
  3. An EventBridge rule triggers a Lambda function based on matching the previous event with an expression.
  4. The Lambda function will:

    1. Analyze the event. The function fetches the account ID, image details (digest and tag), and repository name.
    2. Use fetched information to request a DescribeImageScanFindings API call.
    3. Create a log group for the corresponding repository, if one does not exist already.
    4. Create log streams for each severity found in the findings, and puts each finding in the related log stream, in addition to a summary log stream.
    
  5. After a successful scan and logging attempt by the solution, you can view all image scan findings from CloudWatch logs > the corresponding log group β€˜/aws/ecr/image-scan-findings/repo-name’, with the ability to search for a specific vulnerability in all of the images associated with this repository.

  6. Optional steps include:

    1. Create CloudWatch alarms based on string matching to a vulnerability name, or a specific severity.
    2. Create subscription filters for the log group such as Elasticsearch, Kinesis, and Lambda.
    3. Archive the findings in S3.
    

Image description

Prerequisites
The provided CloudFormation template will need the following permissions:

  • Create a CloudFormation stack.
  • Create an IAM execution role for the Lambda function that has the following actions: ecr:DescribeImageScanFindings logs:CreateLogStream logs:GetLogEvents logs:PutLogEvents logs:CreateLogGroup
  • Create a Lambda function and resource-based permission to allow EventBridge to trigger this Lambda function.
  • Create an EventBridge rule and set the trigger to be the Lambda function.

Deploying the solution using the CloudFormation template:

  1. Download the CloudFormation template.
  2. With the required permissions listed above, upload the CloudFormation template and create a stack.
  3. Test the solution by scanning an image on ECR. Then, go to CloudWatch and check log groups starting with β€˜/aws/ecr/image-scan-findings/repository name’.
  4. Feel free to modify the Lambda function code within the template and/or create the resources manually.

Top comments (1)

Collapse
 
alsaedwy profile image
Alaa Saeed

12 Gorgeous UI Components for Your Design Inspiration

12 Gorgeous UI components for your design inspiration: cards, text, buttons, checkboxes, icons, loaders and menus.