Skip to content

Latest commit

 

History

History
142 lines (105 loc) · 5.76 KB

File metadata and controls

142 lines (105 loc) · 5.76 KB
title OpenClarity Documentation
weight 1
aliases
/docs/overview/

OpenClarity is an open source tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats such as vulnerabilities, exploits, malware, rootkits, misconfigurations and leaked secrets.

Join OpenClarity's Slack channel to hear about the latest announcements and upcoming activities. We would love to get your feedback!

Table of Contents

Why OpenClarity?

Virtual machines (VMs) are the most used service across all hyperscalers. AWS, Azure, GCP, and others have virtual computing services that are used not only as standalone VM services but also as the most popular method for hosting containers (for example, Docker, Kubernetes).

VMs are vulnerable to multiple threats:

  • Software vulnerabilities
  • Leaked Secrets/Passwords
  • Malware
  • System Misconfiguration
  • Rootkits

There are many very good open source and commercial-based solutions for providing threat detection for VMs, manifesting the different threat categories above.

However, there are challenges with assembling and managing these tools yourself:

  • Complex installation, configuration, and reporting.
  • Integration with deployment automation.
  • Siloed reporting and visualization.

The OpenClarity project is focused on unifying detection and management of VM security threats in an agentless manner.

For more information on the capabilities of OpenClarity, see [Features]({{% relref "/docs/features/_index.md" %}}).

Getting Started

For step-by-step guidance on how to deploy OpenClarity across different environments, including AWS, Azure, GCP, and Docker, see [Getting Started]({{% relref "/docs/getting-started/_index.md" %}}) and choose your preferred provider for detailed deployment instructions.

Overview

OpenClarity uses a pluggable scanning infrastructure to provide:

  • SBOM analysis
  • Package and OS vulnerability detection
  • Exploit detection
  • Leaked secret detection
  • Malware detection
  • Misconfiguration detection
  • Rootkit detection

The pluggable scanning infrastructure uses several tools that can be enabled/disabled on an individual basis. OpenClarity normalizes, merges and provides a robust visualization of the results from these various tools.

These tools include:

* Windows only
** Linux and MacOS only

Asset Discovery

The OpenClarity stack supports the automatic discovery of assets in the following providers:

Provider Asset types Scope Installation
Docker Docker containers and images Local Docker daemon {{% xref "/docs/getting-started/deploy-docker/_index.md" %}}
Kubernetes Docker containers and images Cluster {{% xref "/docs/getting-started/deploy-kubernetes/_index.md" %}}
AWS Virtual machines (EC2 instances) Account (all regions) {{% xref "/docs/getting-started/deploy-aws/_index.md" %}}
Azure Virtual machines Subscription {{% xref "/docs/getting-started/deploy-azure/_index.md" %}}
GCP Virtual machines Project {{% xref "/docs/getting-started/deploy-gcp/_index.md" %}}

Supported Filesystems

The following filesystem operations are supported on different host types:

Host List block devices Mount Ext2, Ext3, Ext4 Mount XFS Mount NTFS
Linux Supported Supported Supported Supported
Darwin Supported Supported Supported Supported
Windows Not supported Not supported Not supported Not supported

Architecture

A high-level architecture overview is available under [OpenClarity Stack]({{% relref "/docs/usage/openclarity_stack.md" %}}).

Roadmap

The OpenClarity project roadmap is available here.

Contributing

If you are ready to jump in and test, add code, or help with documentation, please follow the instructions on our contributing guide for details on how to open issues and setup OpenClarity for development and testing.

Code of Conduct

You can view our code of conduct here.

License

Apache License, Version 2.0