SlideShare a Scribd company logo
Anchore Enterprise 5.5 - Adapting to
the new normal at NVD
Neil Levine
VP of Product
Anchore
Alan Pope
Director of DevRel
Anchore
Housekeeping
01
02
03
All participant lines are muted
Questions will be accepted throughout, enter questions via Q&A panel
You will receive a follow-up email with a link to the recording
04 Please respond to poll questions as they are appear on your screen
Agenda
Introductions
01
02 Vulnerability Feeds & NVD Challenges
03 Anchore Vulnerability Feed Service & Enhancements in 5.5
04 Q&A
Vulnerability Feeds
Anchore Enterprise: How it Works
Anchore Enterprise
Run
Deploy
Stage
Build
Source
Runtime
SCM CI/CD Registry
Docker v2
API
Admission
controller
AnchoreCTL AnchoreCTL
Enterprise Capabilities
● Linux and Windows containers
● Malware & secrets scanning in
addition to vulnerabilities
● Fully-supported integrations
with CI/CD tools
● Continuous scanning from
develop to runtime
● Persist SBOMs and security
results across apps and teams
● Enhanced vulnerability feed
● Centralized policy enforcement
with pre-built policy packs
● API/GUI for reporting and
auditing
● Notifications
● Remediation recommendations
& workflows
● Enterprise control with support
for RBAC, SSO, LDAP
● SLA Technical Support
K8S
Inventory
EKS
Inventory
Policy Enforcement | Compliance
Vulnerabilities
SBOM Management
Analyzers
Analyzers Analyzers Analyzers Analyzers
Reporting | Auditing
Malware | Secrets False Positive Mgmt Remediation
Anchore Enterprise: How it Works
Anchore Enterprise
Run
Deploy
Stage
Build
Source
Runtime
SCM CI/CD Registry
Docker v2
API
Admission
controller
AnchoreCTL AnchoreCTL
Enterprise Capabilities
● Linux and Windows containers
● Malware & secrets scanning in
addition to vulnerabilities
● Fully-supported integrations
with CI/CD tools
● Continuous scanning from
develop to runtime
● Persist SBOMs and security
results across apps and teams
● Enhanced vulnerability feed
● Centralized policy enforcement
with pre-built policy packs
● API/GUI for reporting and
auditing
● Notifications
● Remediation recommendations
& workflows
● Enterprise control with support
for RBAC, SSO, LDAP
● SLA Technical Support
K8S
Inventory
EKS
Inventory
Policy Enforcement | Compliance
Vulnerabilities
SBOM Management
Analyzers
Analyzers Analyzers Analyzers Analyzers
Reporting | Auditing
Malware | Secrets False Positive Mgmt Remediation
Vulnerability Data Sources
[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vecto
rString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","accessVector":"NETWORK","accessCo
mplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","in
tegrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":7.1},"baseS
everity":"HIGH","exploitabilityScore":
8.6,"impactScore":6
.9,"acInsufInfo":fal
se,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivile
ge":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"
nvd@nis
t.gov","type":"Primary","description":[{"lang":"en","value":"CWE-189"}]}],"co
nfigurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulner
able":true,"criteria":"
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*","m
atchCriteriaId":"9E86E13
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
GitHub
NVD
Debian
Python
NPM
Vulnerability Data Sources
{"name":"CVE-2024-3094","priority":"
critical","patches":[{"distro":"focal","s
tatus":"not-affected","version":"
5.2.4-1ubuntu1.1","package":"xz-utils","prio
rity":null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubunt
u1","package":"xz-utils","priority":null},{"distro":"mantic","status":"not-af
fected","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored
_patches":[{"distro":"upstream","status":"needs-triage","version":null,"packa
ge":"xz-utils","priority":null},{"distro":"trusty/esm","status":"not-affected
","version":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/x
enial","status":"not-affected","version":null,"package":"
xz-utils","priority"
:null},{"distro":"esm-infra/bionic","status":"not-affected","version":null,"p
ackage":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
GitHub
Debian
Python
NPM
Unreliable Data Sources
{"name":"CVE-2024-3094","priority":"
critical","patches":[{"distro":"focal","s
tatus":"not-affected","version":"
5.2.4-1ubuntu1.1","package":"xz-utils","prio
rity":null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubunt
u1","package":"xz-utils","priority":null},{"distro":"mantic","status":"not-af
fected","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored
_patches":[{"distro":"upstream","status":"needs-triage","version":null,"packa
ge":"xz-utils","priority":null},{"distro":"trusty/esm","status":"not-affected
","version":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/x
enial","status":"not-affected","version":null,"package":"
xz-utils","priority"
:null},{"distro":"esm-infra/bionic","status":"not-affected","version":null,"p
ackage":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
NVD
GitHub
Debian
Python
NPM
Missing & Erroneous Data
{"name":"CVE-2024-3094","priority":"
high","patches":[{"distro":"focal","statu
s":"not-affected","version":"
5.2.5-2ubuntu1","package":"xz-utils","priority":
null},{"distro":"jammy","status":"not-affected","version":"
5.2.5-2ubuntu1","p
ackage":"xz-utils","priority":null},{"distro":"mantic","status":"not-affected
","version":"5.4.1-0.2","package":"xz-utils","priority":null}],"ignored_patch
es":[{"distro":"upstream","status":"needs-triage","version":null,"package":"
x
z-utils","priority":null},{"distro":"
trusty/esm","status":"not-affected","ver
sion":null,"package":"
xz-utils","priority":null},{"distro":"esm-infra/xenial"
,"status":"not-affected","version":null,"package":"
xz-utils","priority":null}
,{"distro":"esm-infra/bionic
","status":"not-affected","version":null,"package
":"xz-utils","pri
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
NVD
GitHub
Debian
Python
NPM
NVD Challenges
NVD (NIST)
CVE Program (MITRE)
Product Owner
Vuln Researcher
Vulnerability Discovered Vulnerability Discovered
Vulnerability Submitted to
CVE Numbering Authority
Published to National
Vulnerability Database
Vulnerability Intake
Vulnerability Triage
Needs More
info/
Provides
additional
info
Vuln
Confirmed
Report Vulnerability
Affected Products
Vulnerability Type
Attack Type
Impact
Provide Additional Details
Bug Bounty Payment
Bounty Payment Received
Reserve CVE
Assign Vuln
CVE
CVE-YYYY-XXX
XX
CVE
Rejected
Needs More Info
Vulnerability Remediation
Coordinated Disclosure
Vulnerability Notification
Coordinated Disclosure
Populate CVE List
CVE Approved
NVD Analyst Assigned
NVD Enrichment
Reference Tags
CVSS
CWE
CPE
Senior Analyst Review
Changes at NVD
NVD (NIST)
CVE Program (MITRE)
Product Owner
Vuln Researcher
Vulnerability Discovered Vulnerability Discovered
Vulnerability Submitted to
CVE Numbering Authority
Published to National
Vulnerability Database
Vulnerability Intake
Vulnerability Triage
Needs More
info/
Provides
additional
info
Vuln
Confirmed
Report Vulnerability
Affected Products
Vulnerability Type
Attack Type
Impact
Provide Additional Details
Bug Bounty Payment
Bounty Payment Received
Reserve CVE
Assign Vuln
CVE
CVE-YYYY-XXX
XX
CVE
Rejected
Needs More Info
Vulnerability Remediation
Coordinated Disclosure
Vulnerability Notification
Coordinated Disclosure
Populate CVE List
CVE Approved
NVD Analyst Assigned
NVD Enrichment
Reference Tags
CVSS
CWE
CPE
Senior Analyst Review
Anchore Vuln Feed Updates
Anchore Vulnerability Feed
Proxy Mode
Anchore sources vulnerability feeds and makes them available to customers
Enabled on a per-feed driver basis
List of known false positives
Anchore sources missing CPE data from NVD records from other sources
(Does not include Severity/CVSS)
Exclusion
Data Feed
Enriched
Data Feed
New in
5.5!
New in
5.5!
Existing Data Source Feed Options
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Direct mode
Direct mode
Direct mode
Direct mode
Exclusion Data Feed
Proxy Mode (5.5+)
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Direct mode
Direct mode
Direct mode
Direct mode
Enriched Data Feed
Exclusion Data Feed
Proxy Mode + Enriched Data (5.5+)
Anchore
Enterprise
Vulnerability
Providers
Canonical
Microsoft
Other 3rd
parties
NVD
Anchore
Vuln
Feed
Proxy mode + Enriched Data
Exclusion Data Feed
Customer Benefits
Proxy Mode
Fewer distractions from 3rd party service outages
No API tokens or service registration
Simple firewall configuration
Fewer false positives due to imprecise vulnerability metadata
Ensures NVD catalog is up to date with CVE records
CPE data missing from NVD records provided by Anchore
Exclusion
Data Feed
Enriched
Data Feed
Enhancing Data Quality
Vulnerability
Providers
CVE5
NVD
Anchore Open Source
Vulnerability Data Tools
+
Human
Review
Anchore
Enterprise
3rd
Party
Products
Get Involved
Anchore Open Source
github.com/anchore
Open Source NVD Enrichment Project
github.com/anchore/vulnerability-data-tools
Enriched NVD Data
github.com/anchore/nvd-data-overrides
Anchore Community Slack
anchore.com/slack
Other New Features
Recent updates
Global CVE
References
Use CVE references in policy or searches independent
of record which generated the match alert
Download the AnchoreCTL client from an
Enterprise API endpoint to ensure version consistency
Simplify authentication for non-human users
AnchoreCTL
Endpoint
Token-based
Auth
New in
5.5!
Summary
1. NVD’s future continues to be uncertain
2. The Anchore Vulnerability Feed helps mitigate some of the data gaps
3. The Anchore Vulnerability Feed simplifies the operations of feed management
4. Customers should enable all feeds for the most accurate results
Next Steps
Get started with a free-trial Anchore Enterprise
https://get.anchore.com/free-trial/
Learn more about Anchore Enterprise
https://anchore.com/platform
Visit our GitHub and Community Slack
github.com/anchore and https://anchore.com/slack
Download the NVIDIA case study
www.anchore.com/nvidia
Thank you for joining!
Schedule a demo of our platform @ get.anchore.com/demo-request

More Related Content

PPTX
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
PPTX
How to Perform Continuous Vulnerability Management
PDF
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
PPTX
Vulnerability Intelligence and Assessment with vulners.com
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
CRA - overview of vulnerability handling
PDF
CyberCentral Summit 2018 in Prague
PDF
What’s the State of Your Endpoint Security?
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
How to Perform Continuous Vulnerability Management
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Vulnerability Intelligence and Assessment with vulners.com
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
CRA - overview of vulnerability handling
CyberCentral Summit 2018 in Prague
What’s the State of Your Endpoint Security?

Similar to Adapting to the new normal at NVD with Anchore Vulnerability Feed (20)

PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PDF
Utilizing Novell Sentinel Advisor and Attack Vulnerability
PDF
Secure Application Development in the Age of Continuous Delivery
PPTX
Secure Application Development in the Age of Continuous Delivery
PDF
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
PDF
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
PPTX
Operationalizing Security Intelligence
PDF
Tenable-Deck-Customer presentation- Shared
PPT
20160221 va interconnect_pub
PDF
Mitigate attacks with IBM BigFix and Q-Radar
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
PDF
Cyber threats
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPTX
Vulnerability intelligence with vulners.com
PPTX
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PPTX
PDF
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PDF
NTXISSACSC3 - Vulnerability Management Isn't Simple ... (or How to Make Your ...
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Utilizing Novell Sentinel Advisor and Attack Vulnerability
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
Operationalizing Security Intelligence
Tenable-Deck-Customer presentation- Shared
20160221 va interconnect_pub
Mitigate attacks with IBM BigFix and Q-Radar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Cyber threats
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Vulnerability intelligence with vulners.com
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
BsidesMCR_2016-what-can-infosec-learn-from-devops
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
NTXISSACSC3 - Vulnerability Management Isn't Simple ... (or How to Make Your ...
Ad

More from Anchore (20)

PDF
How the US Navy Approaches DevSecOps with Raise 2.0
PDF
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
PDF
Shift Right Security for EKS Webinar Slides
PDF
Webinar: How to Identify and Tackle SBOM Sprawl
PDF
Rapid Incident Response to Zero Day Vulnerabilities
PDF
STIG in Action: Continuous Compliance with MITRE & Anchore
PDF
Increase Supply Chain Transparency & Security with Harbor & Anchore
PDF
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
PDF
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
PDF
Understanding SBOMs: An Introduction to Modern Development
PDF
2024 Trends in Software Supply Chain Security
PDF
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
PDF
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
PDF
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
PDF
Release Webinar: Introducing the Anchore Data Service
PDF
How SBOMs Protect Google's Massive Software Supply Chain
PDF
Automated Policy Enforcement for CMMC with Anchore Enterprise
PDF
Adopting the DoD Software Factory Model: Insights & How Tos
PDF
Easy Compliance is Continuous Compliance
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
How the US Navy Approaches DevSecOps with Raise 2.0
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Shift Right Security for EKS Webinar Slides
Webinar: How to Identify and Tackle SBOM Sprawl
Rapid Incident Response to Zero Day Vulnerabilities
STIG in Action: Continuous Compliance with MITRE & Anchore
Increase Supply Chain Transparency & Security with Harbor & Anchore
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Understanding SBOMs: An Introduction to Modern Development
2024 Trends in Software Supply Chain Security
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Release Webinar: Introducing the Anchore Data Service
How SBOMs Protect Google's Massive Software Supply Chain
Automated Policy Enforcement for CMMC with Anchore Enterprise
Adopting the DoD Software Factory Model: Insights & How Tos
Easy Compliance is Continuous Compliance
How to Secure Your Kubernetes Software Supply Chain at Scale
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
project resource management chapter-09.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Hybrid model detection and classification of lung cancer
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
project resource management chapter-09.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
1. Introduction to Computer Programming.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
Web App vs Mobile App What Should You Build First.pdf
A comparative analysis of optical character recognition models for extracting...
Hybrid model detection and classification of lung cancer
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Adapting to the new normal at NVD with Anchore Vulnerability Feed