* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 使用 Palo Alto Networks 的 P... # 使用 Palo Alto Networks 的 Prisma Cloud 计算版本扫描 AWS 镜像仓库ECR [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fscan-aws-image-warehouse-ecr-with-prisma-cloud%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E4%BD%BF%E7%94%A8+Palo+Alto+Networks+%E7%9A%84+Prisma+Cloud+%E8%AE%A1%E7%AE%97%E7%89%88%E6%9C%AC%E6%89%AB%E6%8F%8F+AWS+%E9%95%9C%E5%83%8F%E4%BB%93%E5%BA%93ECR&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fscan-aws-image-warehouse-ecr-with-prisma-cloud%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fscan-aws-image-warehouse-ecr-with-prisma-cloud%2F%3Flang%3Dzh-hans&title=%E4%BD%BF%E7%94%A8+Palo+Alto+Networks+%E7%9A%84+Prisma+Cloud+%E8%AE%A1%E7%AE%97%E7%89%88%E6%9C%AC%E6%89%AB%E6%8F%8F+AWS+%E9%95%9C%E5%83%8F%E4%BB%93%E5%BA%93ECR&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=使用 Palo Alto Networks 的 Prisma Cloud 计算版本扫描 AWS 镜像仓库ECR) Link copied By [Daniel Ma](https://www.paloaltonetworks.com/blog/author/daniel-ma/?lang=zh-hans&ts=markdown "Posts by Daniel Ma") Mar 25, 2020 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/prisma-cloud-scan-aws-social-1200x627-1.png) 目前企业容器的使用越来越普遍,根据Gartner的统计,目前已经有一半的企业已经使用了容器部署。而且这个增长的趋势也会越来越快。其中容器的镜像仓库为存储和分发应用镜像提供了便捷、集中化的来源。当今我们的企业和组织可以很方便地将数以万计的镜像存储在镜像仓库中,比如说我们**AWS** 的镜像仓库**ECR** **(** **Elastic Container Registry** **)。** 可以说他现在是容器化环境运行的核心,因此保护它的安全至关重要。镜像仓库中的镜像给我们的容器部署带来了很多的便利性,但是同时,但是一旦在镜像仓库中存在具有漏洞或者安全隐患的镜像,也会通过容器的自动部署给我们的容器环境带来很大的安全风险。因此,持续监控镜像仓库中镜像的漏洞状态,是一项核心安全要求,需要我们能够保证我们所部署运行的容器本身是安全的。 AWS的ECR本身就内置了镜像漏洞扫描功能,同时可以在镜像上传时自动进行扫描,然后列出镜像中的潜在漏洞。使用也非常的方便。ECR的扫描引擎利用的是开源的CoreOS Clair,并通过Clair提供的CVE数据库列出镜像中的安全漏洞。对镜像内的恶意代码,或者镜像内是否存有敏感信息(用户身份信息),镜像是否以root身份运行,镜像的环境变量里是否存有用户密码信息等这些用户配置层面的检查,还需要利用第三方工具。同时,如何能保证我们的构建的镜像符合Docker或Kubernetes的最佳实践,如何保证合规标准,比如NIST,GDPR,PCI等,同样需要第三方的安全工具来补全。 因此,对很多重度使用容器部署的企业来说,如何能把镜像漏洞扫描,镜像配置及合规检查紧密集成到一个平台,能够清晰的了解自己镜像仓库中镜像的安全状态及其合规情况就显得特别重要。例如: ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/cuebiq.png) **Cuebiq** 是一家总部在美国的市场推广公司。由于要迅速响应市场的变化,及快速发布产品,**Cuebiq** 启用了Kubernetes的架构,同时组织了DevOps的团队来支持应用的快速开发及迭代。但是如何管理容器平台的安全,成为了亟待解决的问题。通过 **Prisma** **Cloud** ,**Cuebiq**能够容易的监控容器间的网络访问,阻止恶意的流量,监控容器进程,并且持续的镜像仓库进行安全漏洞,镜像配置,镜像合规性扫描。以保证所运行的镜像本身都是安全的。 我们今天就来介绍一下如何通过 **Palo Alto Networks** 的 **Prisma Cloud** 计算版本与 **AWS ECR**集成来扫描您镜像仓库中的镜像,查看镜像中存在的漏洞,配置及其镜像合规问题。 要扫描AWS的ECR镜像仓库,Prisma Cloud必须使用IAM用户(服务帐户)或IAM角色通过ECR进行身份验证。所需的最低权限策略是 **AmazonEC2ContainerRegistryReadOnly** 这是一个托管的预定义策略。AWS托管策略授予常见用例所需的最少权限集,因此您无需花费大量时间自己调查权限。 **AmazonEC2ContainerRegistryReadOnly** 权限策略当前定义如下: { "Version": "2012-10-17", "Statement": \[ { "Effect": "Allow", "Action": \[ "ecr:GetAuthorizationToken", "ecr:BatchCheckLayerAvailability", "ecr:GetDownloadUrlForLayer", "ecr:GetRepositoryPolicy", "ecr:DescribeRepositories", "ecr:ListImages", "ecr:DescribeImages", "ecr:BatchGetImage" \], "Resource": "\*" } \] } **先决条件:** 您已部署完容器环境 您已在环境中安装好了Prisma Cloud console及其defender组件。 **第一步:打开控制台并转到 防御\>漏洞\>镜像仓库** **第二步:请点击 添加镜像仓库。** **第三步:在对话框中,输入以下信息:** * 选择**Amazon EC2 container registry** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks2.png) * 输入镜像仓库的**URL** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks3.png) * 输入要扫描的**仓库名称** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks4.png) * 在标签字段中,输入**标签名**。将此字段留空表示扫描所有标签 * 配置**AWS的认证信息** 1\. 1. 如要使用IAM Role进行身份认证,打开 使用IAM Role 2. 如要使用IAM 凭据进行验证,请点击 添加 在里面添加AWS凭据信息 * 在**OS Type** 中\*\*,\*\* 选择镜像仓库中镜像类型\*\*(\*\* **Linux或者Windows)** * 在**Scanner** 中\*\*,\*\* 选择**Automatic (自动)** * 在**Number of Scanners** 中\*\*,\*\* 输入您希望启用扫描功能的**defender容器数量** * 设置**Cap** 的数量\*\*。\*\*选择默认的5会只扫描最近的5个镜像,设为0将扫描所有镜像 * 单击**添加** **第四步:点击黄色存储按键** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks5.png) 第五步\*\*:\*\*检查是否正在扫描添加的镜像仓库中的镜像 * 导航去**Monitor --** **\> Vulnerabilities -\> Registry** **一个进度条会显示当前的扫描状态。当扫描完成时,扫描结果会加入扫描结果表格中** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks6.png) \*\*2)\*\*可以点击镜像中的漏洞,查看漏洞信息 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks7.png) **3** \*\*)\*\*可以点击合规检查,检查容器内是否有恶意软件,是否存有用户敏感信息等等。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks8.png) \*\*4)\*\*可以点击Layer查看镜像build的每个Layer信息,清晰了解问题的根源及提供如何修复建议 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/scan-aws-image-warehouse-ecr-with-prisma-cloud-computing-version-of-palo-alto-networks9.png) *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language