[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-17。"],[[["\u003cp\u003eThe \u003cstrong\u003eSecurity insights\u003c/strong\u003e side panel in Google Cloud console provides a comprehensive overview of security metrics for deployed container images, helping users identify and address potential risks.\u003c/p\u003e\n"],["\u003cp\u003eSecurity insights include the SLSA build level, vulnerabilities, VEX status, SBOM, and build details, allowing for a detailed examination of the security posture of the artifacts.\u003c/p\u003e\n"],["\u003cp\u003eTo access security insights, container images must meet certain requirements, including having vulnerability scanning enabled, the appropriate IAM roles granted, and using SHA-qualified image names.\u003c/p\u003e\n"],["\u003cp\u003eEnabling vulnerability scanning, which is facilitated by Artifact Analysis and Cloud Build, is crucial for receiving all available security insights, as it automatically scans build artifacts for potential vulnerabilities.\u003c/p\u003e\n"],["\u003cp\u003eViewing security insights is accessible via the \u003cstrong\u003eView\u003c/strong\u003e link in the \u003cstrong\u003eSecurity insights\u003c/strong\u003e column within the \u003cstrong\u003eArtifacts\u003c/strong\u003e tab of a release's details page in the Cloud Deploy delivery pipeline, after navigating through the projects, delivery pipelines and the associated release.\u003c/p\u003e\n"]]],[],null,["# View security insights in Cloud Deploy\n\nThis page explains how to view security information about the container images\nyou deploy. You can view this information in the **Security insights** side\npanel for Cloud Deploy in Google Cloud console.\n\nThe **Security insights** side panel provides a high-level overview of multiple\nsecurity metrics. You can use this panel to identify and mitigate risks in\nthe images you deploy.\n\nThis panel displays the following information:\n\n- SLSA build level\n\n Identifies the maturity level of your software build process in accordance\n with the\n [Supply-chain Levels for Software Artifacts (SLSA) specification](https://slsa.dev).\n- Vulnerabilities\n\n Lists any vulnerabilities found in your artifact or artifacts.\n- VEX status\n\n [Vulnerability Exploitability eXchange(VEX) status](/artifact-analysis/docs/upload-view-vex-statements)\n for the build artifacts.\n- SBOM\n\n [**Software bill of materials (SBOM)**](/artifact-analysis/docs/sbom-overview)\n for the build artifacts.\n- Build details\n\n Includes information about the build.\n\nRequirements\n------------\n\nSecurity insights are available only for container images that meet the\nfollowing requirements:\n\n- Vulnerability scanning must be [enabled](#enable_vulnerability_scanning).\n\n- The required Identity and Access Management\n [roles must be granted](#grant_permissions_to_view_insights), in\n the project where Artifact Analysis is running.\n\n- The name of the image, as part of [release creation](/sdk/gcloud/reference/deploy/releases/create#--images),\n must be [SHA qualified](/kubernetes-engine/docs/concepts/about-container-images).\n\n If the image is shown in the **Artifacts** tab in Cloud Deploy\n without the SHA256 hash, you might need to rebuild that image.\n\nEnable vulnerability scanning\n-----------------------------\n\nThe information shown in the **Security Insights** panel comes from\n[Artifact Analysis](/container-analysis/docs/container-analysis) and\npotentially from [Cloud Build](/build/docs/overview).\nArtifact Analysis is a service that provides integrated\non-demand or automated scanning for base container images, Maven, and Go\npackages in containers, and for non-containerized Maven packages.\n\nTo receive all of the security insights available, you must enable vulnerability\nscanning:\n\n1. To turn on vulnerability scanning, enable the required APIs.\n\n\n [Enable the APIs](https://console.cloud.google.com/flows/enableapi?apiid=containerscanning.googleapis.com,cloudbuild.googleapis.com,artifactregistry.googleapis.com,containersecurity.googleapis.com)\n\n \u003cbr /\u003e\n\n2. Build your container image, and\n [store it in Artifact Registry](/build/docs/building/store-artifacts-in-artifact-registry).\n Artifact Analysis automatically scans the build artifacts.\n\n Vulnerability scanning may take a few minutes, depending on the size of your\n container image.\n\nFor more information on vulnerability scanning, see\n[On-push scanning](/container-analysis/docs/scanning-types#on-push_scanning).\n\nThere is a cost for scanning. See the [Pricing page](/container-analysis/pricing)\nfor pricing information.\n\nGrant permissions to view insights\n----------------------------------\n\nTo view security insights in Cloud Deploy, you need the IAM\nroles described here, or a role with equivalent permissions. If Artifact Registry and\nArtifact Analysis are running in different projects, you must\nadd the Artifact Analysis Occurrences Viewer role, or\nequivalent permissions, in the project where Artifact Analysis\nis running.\n\n- [Cloud Build Viewer](/iam/docs/understanding-roles#cloudbuild.builds.viewer)\n (`roles/cloudbuild.builds.viewer`)\n\n View insights for a build.\n- [Artifact Analysis Viewer](/iam/docs/understanding-roles#containeranalysis.occurrences.viewer)\n (`roles/containeranalysis.occurrences.viewer`)\n\n View vulnerabilities and other dependency information.\n\nView security insights in Cloud Deploy\n--------------------------------------\n\n1. Open the Cloud Deploy **Delivery pipelines** page in the\n Google Cloud console:\n\n [Open the delivery pipelines page](https://console.cloud.google.com/deploy)\n2. If necessary, select the project that includes the pipeline and release that\n delivered the container image for which you want to view security insights.\n\n3. Click the name of the delivery pipeline.\n\n The delivery pipeline details are shown.\n4. From the Delivery pipeline details page, select a release that delivered the\n container image.\n\n5. On the Release details page, select the **Artifacts** tab.\n\n Containers that were delivered by the selected release are listed under\n **Build artifacts** . For each container, the **Security insights** column\n includes a **View** link.\n | **Note:** If security insights are not available for a given container image, the **View** link is disabled. The **View** link is disabled if the container doesn't satisfy all requirements for it to have been scanned.\n\n6. Click the **View** link next to the name of the artifact whose security\n details you want to view.\n\n The **Security insights** panel is displayed, showing available security\n information for this artifact. The following sections describe this\n information in more detail.\n\n### SLSA level\n\nSLSA is an industry-standard set security guidelines for producers and consumers\nof software. This standard establishes\n[four levels](https://slsa.dev/spec/v0.1/levels) of confidence in the security\nof your software.\n\n### Vulnerabilities\n\nThe **Vulnerabilities** card shows the vulnerability occurrences,\navailable fixes, and VEX status for the build artifacts.\n\n[Artifact Analysis](/artifact-analysis/docs/scanning-types#automated)\nsupports scanning for container images pushed to\n[Artifact Registry](/artifact-registry/docs/overview). The scans detect\nvulnerabilities in operating system packages, and in application packages\ncreated in Python, Node.js, Java (Maven), or Go.\n\nScanning results are organized by [severity\nlevel](/artifact-analysis/docs/os-overview#severity_levels_for_vulnerabilities).\nThe severity level is a qualitative assessment based on exploitability, scope,\nimpact, and maturity of the vulnerability.\n\nClick the image name to see the artifacts that have been scanned for\nvulnerabilities.\n\nFor every container image pushed to Artifact Registry, Artifact Analysis\ncan store an associated VEX statement. VEX is a type of security advisory that\nindicates whether a product is affected by a known vulnerability.\n\nEach VEX statement provides:\n\n- The publisher of the VEX Statement\n- The artifact for which the statement is written\n- The vulnerability assessment (VEX status) for any CVEs\n\nDependencies\n------------\n\nThe **Dependencies** card displays a list of SBOMs that include a list of\ndependencies.\n\nWhen you build a container image using Cloud Build and push\nit to Artifact Registry, Artifact Analysis can generate SBOM records for\nthe pushed images.\n\nAn SBOM is a full inventory of an application, identifying the packages your\nsoftware relies on. The contents can include third-party software from vendors,\ninternal artifacts, and open source libraries.\n\n### Build details\n\nThe build details include the following:\n\n- A link to the Cloud Build logs\n\n- The name of the builder that built the image\n\n- The build date/time\n\n- Build provenance, in JSON format\n\nWhat's next\n-----------\n\n- Try the quickstart [Deploy an app to GKE and view security insights](/software-supply-chain-security/docs/sds/deploy-gke-view-security-insights)\n\n- Try the quickstart [Deploy an app to Cloud Run and view security insights](/software-supply-chain-security/docs/sds/deploy-run-view-security-insights)\n\n- Learn [software supply chain security best practices](/software-supply-chain-security/docs/overview).\n\n- Learn how to [store and view build logs](/build/docs/securing-builds/store-view-build-logs)."]]