Skip to main content

Artifact view

The Artifacts section in the SSCA module is a centralized hub for viewing all your container images and their details, providing deeper visibility into your artifacts from multiple perspectives within the software supply chain. Here are the key features this section offers:

Any artifacts that go through SBOM Orchestration, SBOM Policy Enforcement, or SLSA Provenance will be listed here. Additionally, the Artifacts section integrates with the Harness CD (Continuous Deployment) and STO (Security Testing Orchestration) modules, providing details linked to deployments and security scanning results for images.

View your artifacts

The landing page of the Artifacts section provides a comprehensive list of all artifacts, displaying the following details for each:

  • Name: The name of the artifact.
  • Digests: The number of digests associated with the artifact.
  • Environments: The environments where the artifact has been deployed with the count.
  • Vulnerabilities: The vulnerabilities identified in the most recent scan of the digest.

Search and filter options

You can search for a specific artifact or apply filters based on dependencies, licenses, and environment types to quickly find the necessary information.

Digests for your artifact

When you select an artifact, you can view the list of all its digests. For each digest, the following details are available:

  • Tags: The tags associated with the digest.
  • SBOM and Score: The Software Bill of Materials (SBOM) and its quality score, with an option to download it.
  • Environment: The count and types of environments (e.g., prod, pre-prod) where the digest has been deployed.
  • Dependencies: The total number of dependencies included in the image, as detailed in the SBOM.
  • Policy Violations: A list of all policy violations, including both allow-list and deny-list violations.
  • Vulnerabilities: The count of vulnerabilities categorized by severity: Critical, High, Medium, and Low.

Search and filter options:

You can search for a specific digest or apply filters based on dependencies, licenses, policy violations, and environment types to quickly find the required data.

Artifact Overview

When you select an artifact’s digest, you can view a complete overview. This tab provides general information about the artifact and summarizes the following aspects concisely:

  • Chain of Custody: A complete record of the artifact's journey through the supply chain. These log items on the chain of custody include events such as SBOM generation, SLSA Provenance generation/verification, SBOM Policy Enforcement, and deployments to environments etc.,
  • Deployments: Displays the count of deployments specific to each environment (e.g., prod, pre-prod).
  • SBOM: Shows the total number of dependencies along with the SBOM score. You can also download the SBOM from here.
  • SBOM Policy Violations: Lists the SBOM policy violations for both allow-list and deny-list categories.
  • Vulnerabilities: Provides a summary of vulnerabilities found from the security scan, categorized by severity: critical, high, medium, and low.
  • SLSA: Shows the status of SLSA verification (passed/failed). You can also download the SLSA provenance from here.

SBOM Tab

The SBOM tab presents details of all the dependencies within the artifact, including dependencies from various levels, such as the application level, distribution level, and OS level. With a count of total dependencies at the top, the tab provides the following details:

  • Dependency Name: Name of the dependency.
  • License: Name of the dependency’s license.
  • Package Manager: Tool managing the package.
  • PURL: Package URL.
  • Supplier: Source of the dependency.

For more information about the levels of image dependencies, refer to the "Label Components from Image" documentation.

Search and filter options

You can search for a package manager and supplier or apply filters based on dependencies, licenses, and image layers to quickly find the required data.

Deployments Tab

The Deployments tab enables you to track the active deployments of your artifact. With a count of active deployments, this tab provides the following details:

  • Environment: Name and ID of the environment.
  • Type: Environment type (Prod or Pre-prod).
  • Last Pipeline Execution: Pipeline that last deployed the artifact.
  • Policy Violations: Lists SBOM policy violations (allow-list and deny-list).
  • SLSA Verification: Shows SLSA verification status, including both SLSA policy and attestation verification statuses.
  • Triggered By: Details about the deployment trigger.

Search and filter options

You can search for an environment or apply filters based on environment type and policy violations to quickly find the required data.

Vulnerabilities Tab

The Vulnerabilities tab presents the scan results performed on the artifact, consolidating findings from various scanning tools. This view categorizes all identified vulnerabilities by severity and allows filtering based on scanners and other details. The security scanning is facilitated by the Harness STO (Security Testing Orchestration) module.

Refer to view security test results in Harness STO documentation for more detailed information about the view and navigation.