This tutorial video shows how to identify and triage the Log4j vulnerability using Anchore Enterprise. It details how to validate in runtime, the CISA policy bundle, automated policy function, automated enforcement function, and visibility to see if Log4j was inherited from a base image.
Category: Videos
Identify Log4j Using Anchore Enterprise with Anchore CTL
This tutorial video shows how to identify the Log4j vulnerability using Anchore CTL. AnchoreCTL is a command line client for Anchore Enterprise that makes it easy to automate
Find the Log4j Vulnerability Using Syft and Grype
This tutorial video shows a walkthrough of how to generate an SBOM using Syft and how to scan that SBOM with Grype to identify any instances of the Log4j vulnerability.