<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[ProGet: implement Policies &amp; Blocking support for Container feeds]]></title><description><![CDATA[<p dir="auto">Hi!</p>
<p dir="auto">My organization has departments/products with various risk aptite and regulatory requirements.</p>
<p dir="auto">We need to be able to assess vulnerabilities in containers per feed/policy, in the same way that can be done for 3rd-party components.</p>
<p dir="auto">Best regards<br />
Nils Nilsson</p>
]]></description><link>https://forums.inedo.com/topic/5748/proget-implement-policies-blocking-support-for-container-feeds</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 12:24:00 GMT</lastBuildDate><atom:link href="https://forums.inedo.com/topic/5748.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 06:51:40 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to ProGet: implement Policies &amp; Blocking support for Container feeds on Wed, 13 May 2026 06:53:16 GMT]]></title><description><![CDATA[<p dir="auto">Hi!</p>
<p dir="auto">My organization has departments/products with various risk aptite and regulatory requirements.</p>
<p dir="auto">We need to be able to assess vulnerabilities in containers per feed/policy, in the same way that can be done for 3rd-party components.</p>
<p dir="auto">Best regards<br />
Nils Nilsson</p>
]]></description><link>https://forums.inedo.com/post/19663</link><guid isPermaLink="true">https://forums.inedo.com/post/19663</guid><dc:creator><![CDATA[Nils Nilsson]]></dc:creator><pubDate>Wed, 13 May 2026 06:53:16 GMT</pubDate></item><item><title><![CDATA[Reply to ProGet: implement Policies &amp; Blocking support for Container feeds on Wed, 13 May 2026 20:19:50 GMT]]></title><description><![CDATA[<p dir="auto">Hi <a class="plugin-mentions-user plugin-mentions-a" href="https://forums.inedo.com/uid/3604">@Nils-Nilsson</a> ,</p>
<p dir="auto">We're considering "doing something" about this for our ProGet 2027 roadmap, but I really want to think about how this should be handled in ProGet.  I want to create something that actually is helpful in identifying real security risks... and I'm not sure if our package-intended Policies is the move for Docker containers.</p>
<p dir="auto">One major issue is that nearly all vulnerable packages in a container IMAGE pose zero risk. Even if the component were used (most aren't... they're just installed), exploitation would require someone SSH'ing into the container and running interactive commands.  <a href="https://security.inedo.com/vulnerability/details/PGV-2387734" rel="nofollow">PGV-2387734</a> is a great example of this.</p>
<p dir="auto">It's actually more risky to remediate the vulnerability and become "sensitized" to vulnerabilities like this. So, we want to make sure we can find  way to "permanently mute" these for certain containers - and perhaps that involves saying "I do not actively use this component that happens to be installed in the image"? I'm not sure.</p>
<p dir="auto">There are also some issues with the ways vulnerabilities work with certain Linux distros; for example, the "patch version" varies by operating system, and that information isn't readily available in the vulnerability database and ProGet isn't analyzing which operating system the platform is using.</p>
<p dir="auto">We have a rough idea of treating Docker images to be more like SCA Builds than Feed Packages, in that an entire container image would be considered complaint. However, how many container images are built (it's done at CI for a lot of people), how few people seem to use pre-release tagging, etc., I don't know what makes sense here.</p>
<p dir="auto">Anyway let me know your thoughts!</p>
<p dir="auto">Thanks,<br />
Steve</p>
]]></description><link>https://forums.inedo.com/post/19667</link><guid isPermaLink="true">https://forums.inedo.com/post/19667</guid><dc:creator><![CDATA[apxltd]]></dc:creator><pubDate>Wed, 13 May 2026 20:19:50 GMT</pubDate></item></channel></rss>