Welcome to the Vision One Container Security Demo Documentation. This package contains all required files to demo Trend Vision One - Container Security from zero to hero!
- AWS Account with Admin permissions
- Trend Vision One Account with access to Container Security
- Internet access 😅 - https://bfy.tw/Tm18
- Login to your AWS Account
- Select the AWS CloudShell service
- Create the overrides.yaml file needed to deploy container security
Click here if you need help with this step!
- Visit the Trend Vision One Documentation to learn how to add a cluster (LINK)
- Download the override.yaml file from the k8s provisioning UI flow
- Upload the file into AWS Cloudshell
-
Run the following 3 commands
- wget https://v1-demo-environments.s3.amazonaws.com/launch.sh
- chmod +x launch.sh
- ./launch.sh REPLACE_WITH_STACK_NAME REPLACE_WITH_AWS_REGION
-
Have fun!
This will:
- Deploy an ECS cluster with a vulnerable service/task (not exposed to the internet)
- Deploy an EKS cluster with worker nodes
- Deploy Container Security to your EKS Cluster using the overrides files you uploaded
- Deploy purposefully vulnerable applications to the EKS cluster
⚠️ The deployment process can take up to 30 minutes.
First, show that the cluster has the application running running:
kubectl get pods --namespace demo
We want to be able to showcase that we are able to scan containers quickly as they are admitted by the cluster.
- Make sure you already have Container Security deployed to your cluster.
- Show the Vulnerability View page and point to the fact it has no vulnerabilities related to the image you are about to deploy.
- Deploy your container.
- If you haven't yet, take a minute to explain what we are doing behind the scenes.
- Go to the Vulnerability View page. You should now see the vulnerabilities of your newly deployed container.
- Don't see the new vulnerabilities? Wait a few seconds and hit the Refresh button.
- Profit!
./attack.sh
This will take you to a CLI tool to enable you to run attacks from a separated container exploiting a vulnerability in a Apache Struts 2 application.