Vulnerability Policy

Vulnerability Policies enable you to set the acceptable severity threshold for vulnerabilities within your organization. You can create several policies at different levels and determine the actions to take when a package returns a vulnerability level that meets or exceeds a specified threshold.

This feature is useful when you want to either flag or automatically quarantine a package based on the level of vulnerability detected.

Supported Package formats

Vulnerability scanning and vulnerability policies are supported for the following package formats:

View Vulnerability Policies

To manage vulnerability policies in your organization, go to your organization's "Settings" page and select "Vulnerability Policy" from the left-hand menu.

🚧

During the beta phase, you can only create and delete vulnerability policies. Deactivating a policy is not currently supported, so any policy created will remain active until deleted.

823

View Vulnerability Policies

Create Vulnerability Policy

To create a new vulnerability policy, click "Create Vulnerability Policy."

824

Create Vulnerability Policy Button

You are then presented with the “Create Vulnerability Policy” form:

Create Vulnerability Policy Form

Create Vulnerability Policy Form

Here you can define the following:

Policy NameA display name for the Vulnerability Policy.
DescriptionA description of the Vulnerability Policy.
Package QueryA search query that you can use to target this policy at a specific repository, package format or package name. See Searching / Filtering for more details on the available fields you can filter on
Select Vulnerability ThresholdThe vulnerability threshold for the policy.

Following a package security scan, if a vulnerability matching or exceeding this value is returned, the package will be in violation of the policy.

Vulnerability thresholds are based on the following CVSS v3.1 severity ratings:
• Critical (9.0 - 10.0)
• High (7.0 - 8.9)
• Medium (4.0 - 6.9)
• Low (0.1 - 3.9)
Quarantine packages which violate policyIf set to "Yes", any package that has a vulnerability equal to or higher than the threshold will be flagged and automatically quarantined.

If set to "No", packages that violate the policy will only be flagged, but they will not be automatically quarantined.
Allow Unknown severity levelVulnerabilities may have no CVSS score or severity rating, in which case the severity level is categorized as "Unknown".

This setting determines whether or not the Vulnerability Policy should be applied to packages which have vulnerabilities in that category.

If set to "Yes", a package with vulnerabilities of an unknown severity level will not be considered to be in violation of the policy.

If set to "No", a package with vulnerabilities of an unknown severity level will be considered to be in violation of the policy and the configured policy actions will be taken.

Once saved, the policy is enabled across your organsization, and the vulnerability policy check is performed on a package every time it undergoes a security scan.

📘

Packages are automatically security scanned on upload and subsequent security scans can be triggered manually via the Web UI, and the Cloudsmith API. See [Security Scanning] for further details on our security scanning feature.

Policy Violation Notification

When a package violates a vulnerability policy a warning is displayed within the UI:

1199

Vulnerability Violation Warning

Clicking the link within this warning, displays a custom search page, displaying all packages with policy violations:

901

Policy Violation List

📘

You can view this violation list at any time using our package search (link) feature and setting the filter to policy_violated:true for all policy violations, or vulnerability_policy_violated:true to only display vulnerability policy violations.

Policy Violation Identifiers

Within a repository, packages with policy violations are identified with the Policy Violation and Quarantined icons.

1177

Policy Violation Indicators

Policy ViolationThis package is in violation of a vulnerability policy. Click on the package to view more details.
QuarantinedThis package has been quarantined, downloads will be blocked until the package is released from quarantine.

Reason given: the package was quarantined as a result of a policy violation
Security Vulnerability DetectedThe security scan has detected vulnerabilities within this package.

Clicking on the package name displays the Package view page, which provides details on the policy that has been violated.

Package Logs

Logs of policy violations and quarantining actions are also displayed within the Package Logs page:

📘

Hover over the “policy violation” text to display additional details on the policy and vulnerability violation.

Restore a package that violates a policy

To remove a policy violation, you have three options:

  • Upgrade the package to a version that has resolved the security vulnerability.
  • Edit the vulnerability policy to lower the threshold below the violated level. A manual rescan of the package is required to remove the policy violation flag and the package must also be manually released from quarantine.
  • Use the restore functionality to remove the package from quarantine. Keep in mind, however, that subsequent security scans may return the package to quarantine. See Release from quarantine for instructions on restoring a package from quarantine.

Cloudsmith is the new standard in Package / Artifact Management and Software Distribution

With support for all major package formats, you can trust us to manage your software supply chain.


Start My Free Trial Now
Cookie Declaration (Manage Cookies)