Description | Where does the data come from that Lacework uses to scan for vulnerabilities? |
Scope | Lacework |
Solution |
For both hosts and containers, a scan is performed against the source which generates a manifest.json that contains all the package data for either the host or container image. Host:
Container:
Container registry and images within it can be scanned by all of the above container options. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.