Container Security Operator (CSO)

Scan pod images using the Red Hat Quay Container Security Operator (CSO).

The Container Security Operator integrates Quay and Clair metadata into Kubernetes / Red Hat OpenShift, allowing you to scan images for vulnerabilities and compliance issues. This ensures that the images used in your pods are secure and meet relevant standards.

Installing the Quay CSO Operator

  • Open a browser and log in to the Red Hat OpenShift Container Platform web console.

  • From the Administrator perspective, click Operators and then OperatorHub.

  • In the Filter by keyword field, type Red Hat Quay.

operatorhub quay
  • Select the Red Hat Quay Container Security Operator tile and click Install.

cso install
  • On the Install Operator page, select stable-3.15 from the Update Channel options. Choose All namespaces on the cluster (default) as the installation mode and select Automatic for update approval.

cso install params
  • Click Install to start the installation.

Checking Image Vulnerabilities from the Red Hat OpenShift Web Console

Deploy a vulnerable image to verify how the Quay Container Security Operator (CSO) detects and displays image vulnerabilities in the OpenShift console.

  • Open the Red Hat OpenShift Container Platform web console and create a new project by clicking Projects, then Create Project. Name the project jmxtrans and click Create.

  • With the jmxtrans project selected, deploy the vulnerable image by clicking Workloads, then Deployments. Click Create Deployment.

create deployment
  • Switch to YAML view and replace the default image value with the image from your Quay registry. Set the number of replicas as desired, and name the deployment jmxtrans.

apiVersion: apps/v1
kind: Deployment
metadata:
  namespace: jmxtrans
  name: 'jmxtrans'
spec:
  selector:
    matchLabels:
      app: name
  replicas: 1
  template:
    metadata:
      labels:
        app: name
    spec:
      containers:
        - name: container
          image: >-
            quay.io/strimzi/jmxtrans:0.34.0
          ports:
            - containerPort: 8080
              protocol: TCP
  strategy:
    type: RollingUpdate
    rollingUpdate:
      maxSurge: 25%
      maxUnavailable: 25%
  • Click Create.

  • Red Hat OpenShift will start the deployment and create the pod. Go to WorkloadsPods and select one of the jmxtrans pods. Then open the Vulnerabilities tab.

pods
  • Click any listed vulnerability to open its details.

vuln tab

You will see the Image Manifest Vulnerabilities view:

vulnimgmanifest

Additionally, after installing the CSO Operator, a new Image Vulnerabilities status appears on the Cluster Overview page.

overview
  • Click Image Vulnerabilities, then View all, and filter by the jmxtrans project.

vulnlist
  • Click on a specific manifest entry to view more details. You will be redirected to the Quay Security Scanner Dashboard.

quayredirect

By integrating the Red Hat Quay Container Security Operator (CSO) with OpenShift, we can automatically surface image vulnerabilities directly in the cluster console.

This integration bridges image scanning data from Quay and Clair with running workloads, enabling proactive detection and remediation of vulnerabilities across deployed containers.