...
...
...
...
...
...
...
...
...
...
...
...
...
...
Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Sensors
...
Sensor installation must come before adding a registry.
...
With the exception of Docker Hub, each registry type requires setups to be in place ahead of configuration connectors within the Armor Management Portal (AMP). Follow the vendor-specific instructions below.
AWS Elastic Container Registry
Create IAM Role
Log in to Amazon Web Services (AWS) Console.
Go to the IAM service.
Go to Roles and click Create Role
Under "Select type of trusted entity" choose Another AWSaccount. Then:a.Paste in the Qualys AWS Account ID (from connector details).b.Select Require external ID and paste in the External ID (from connector details).c.Click Next: Permissions
Find the policy titled "AmazonEC2ContainerRegistryReadOnly"and select the check box next to it.
Enter a role name (e.g. CMS) and click Create role.
Click on the role you just created to view details. Copy the Role ARN value and paste it into the connector details.
...
Azure Container Registry
Step 1: Create Application and get Application Id & Client Secret
Log on to Microsoft Azure portal, navigate to Azure Active Directory then to App Registrations.
Click on New Registration and provide the folowing details:a. Name: A name for the application.b. Supported account types: Single Tenant and Accounts in this organizational directory only.
Click on Register.
Copy the Application (client) ID.
Navigate to the Certificates & secrets on the left panel then generate client secret by clicking on New Client Secret, provide the following details:
Description: A description of the client secret.
Expires: Never.
Click on Add.
Copy the Client secret that is generated.
Step 2: Assigning Service Principal
Log on to Microsoft Azure portal
In the left panel, navigate to Container registries and then Access control (IAM)
Navigate to Role assignments
Click the Add the to Add Role assignment option and provide the following details:
Role: Contributor.
Assign access to: Azure AD user, group or service principal.
Select: Application created with client secret.
Click on Save.
Step 3: Provide Configuration Details to Armor
Add Application Id and Client Secret to the Connector Details screen within the Armor Management Portal (AMP).
...
Google Cloud Container Registry
Step 1: Enabling Access Within API Library
Log into Google Cloud Platform (GCP) console.
Select an organization.
Select a project or create a new project. Ensure that you select the correct project.
In the left sidebar, navigate to APIs and Services.
Search Compute Engine API from the API Library, click Manage and then click Enable API. Similarly, also enable Cloud Resource Manager API, Compute Engine API, Kubernetes Engine API and Cloud SQL Admin API from the API library.
Step 2: Setting Up A Service Account
Login to the GCP console and select a project.
From the left sidebar, navigate to IAM & admin > Service accounts
Ckick Click CREATE SERVICE ACCOUNT.
Provide a name and description (optional) for the service account and click CREATE.
Choose Viewer and Security Reviewer role to assign at least reader permissions to the service account and click CONTINUE.
Click CREATE KEY.
Select JSON as Key type and click CREATE. A message saying "Private key saved to your computer" is displayed and the JSON file is downloaded to your computer.
Click CLOSE and then click DONE.
Step 3: Provide Configuration File to Armor
Once you have downloaded your configuration file, add it to the Connector Details screen within the Armor Management Portal (AMP).
...
...