Artifact view
The Artifacts section in the SCS module is a centralized hub for viewing all your container images and their details, providing deeper visibility into your artifacts from multiple perspectives within the software supply chain. Here are the key features this section offers:
- Artifact Listing: View all container images, including their digests and tags.
- Dependency Visibility: Gain insight into artifact dependencies through SBOM.
- Chain of Custody: Log the artifact's journey throughout the software supply chain.
- Policy Enforcement: View SBOM policy violations.
- Deployment Tracking: Track artifact deployments across various environments.
- Security Insights: Access information on security vulnerabilities.
- SLSA Provenance: View the provenance and verification status of artifacts following the SLSA framework.
Any artifacts that go through SBOM Orchestration, SBOM Policy Enforcement, or SLSA Provenance will be listed here. Additionally, the Artifacts section integrates with the Harness CD (Continuous Deployment) and STO (Security Testing Orchestration) modules, providing details linked to deployments and security scanning results for images.
View your artifacts
The landing page of the Artifacts section provides a comprehensive list of all artifacts, displaying the following details for each:
- Name: The name of the artifact.
- Digests: The number of digests associated with the artifact.
- Environments: The environments where the artifact has been deployed with the count.
- Vulnerabilities: The vulnerabilities identified in the most recent scan of the digest.
Search and filter options
You can search for a specific artifact or apply filters based on dependencies, licenses, and environment types to quickly find the necessary information.
Digests for your artifact
When you select an artifact, you can view the list of all its digests. For each digest, the following details are available:
- Tags: The tags associated with the digest.
- SBOM and Score: The Software Bill of Materials (SBOM) and its quality score, with an option to download it.
- Environment: The count and types of environments (e.g., prod, pre-prod) where the digest has been deployed.
- Dependencies: The total number of dependencies included in the image, as detailed in the SBOM.
- Policy Violations: A list of all policy violations, including both allow-list and deny-list violations.
- Vulnerabilities: The count of vulnerabilities categorized by severity: Critical, High, Medium, and Low.
Search and filter options:
You can search for a specific digest or apply filters based on dependencies, licenses, policy violations, and environment types to quickly find the required data.
Artifact Overview
When you select an artifact’s digest, you can view a complete overview. This tab provides general information about the artifact and summarizes the following aspects concisely:
- Deployments: Displays the count of deployments specific to each environment (e.g., prod, pre-prod).
- SBOM: Shows the total number of dependencies along with the SBOM score. You can also download the SBOM from here.
- SBOM Policy Violations: Lists the SBOM policy violations for both allow-list and deny-list categories.
- Vulnerabilities: Provides a summary of vulnerabilities found from the security scan, categorized by severity: critical, high, medium, and low.
- SLSA: Shows the status of SLSA verification (passed/failed). You can also download the SLSA provenance from here.
Chain of Custody
The Chain of Custody provides a comprehensive and immutable record of an artifact's lifecycle throughout the software supply chain. It captures every significant event during the artifact's journey, allowing detailed traceability. These logs include events from stages such as Build (Harness CI), Deploy, and Security (actions from the Harness STO and SCS modules).
Each entry in the Chain of Custody contains relevant details about the artifact's progress, such as the status of the event, any associated downloadable artifacts, or a link to the pipeline execution results for further details. The information recorded varies depending on the specific event and includes:
- What: The operation performed on the artifact.
- When: The timestamp of the action.
- Where: The stage where the event occurred.
- Why: The purpose of the action, often linked to pipeline execution data.
SBOM Tab
The SBOM tab presents details of all the dependencies within the artifact, including dependencies from various levels, such as the application level, distribution level, and OS level. With a count of total dependencies at the top, the tab provides the following details:
- Dependency Name: Name of the dependency.
- License: Name of the dependency’s license.
- Package Manager: Tool managing the package.
- PURL: Package URL.
- Supplier: Source of the dependency.
For more information about the levels of image dependencies, refer to the "Label Components from Image" documentation.
Search and filter options
You can search for a package manager and supplier or apply filters based on dependencies, licenses, and image layers to quickly find the required data.
Deployments Tab
The Deployments tab enables you to track the active deployments of your artifact. With a count of active deployments, this tab provides the following details:
- Environment: Name and ID of the environment.
- Type: Environment type (Prod or Pre-prod).
- Last Pipeline Execution: Pipeline that last deployed the artifact.
- Policy Violations: Lists SBOM policy violations (allow-list and deny-list).
- SLSA Verification: Shows SLSA verification status, including both SLSA policy and attestation verification statuses.
- Triggered By: Details about the deployment trigger.
Search and filter options
You can search for an environment or apply filters based on environment type and policy violations to quickly find the required data.
Vulnerabilities Tab
The Vulnerabilities tab presents the scan results performed on the artifact, consolidating findings from various scanning tools. This view categorizes all identified vulnerabilities by severity and allows filtering based on scanners and other details. The security scanning is facilitated by the Harness STO (Security Testing Orchestration) module.
Refer to view security test results in Harness STO documentation for more detailed information about the view and navigation.