Introduction
Security vulnerabilities can be exploited to cause denial of service, remote code execution, privilege escalation, or unauthorized access to sensitive data. Effective vulnerability management is therefore a core part of operating a secure Kubernetes environment.
In Alauda Security Service, vulnerability workflows are centered on:
- Results for day-to-day triage
- Exception Management for deferred and false-positive requests
- Vulnerability Reporting for scheduled and downloadable reports