Team Slim typically releases new features and functionality to our web portal, CLI, and APIs weekly. Bookmark this page and check frequently to get the latest.
We've given our Login page a new look and feel to reflect the evolution of the Slim brand. This also includes an updated Product Tour that gives users a glimpse into our Dashboard experience, image watching, Slack integration tooling, container profiling, and automated hardening.
A "Security" view has been added to the Slim Platform. This is the future home of our Security features for triaging and managing vulnerabilities.
Our image vulnerability Burndown charts have been updated to provide an improved user experience.
Performance improvements to the Dashboard were made to more quickly display customer image inventory for our larger customers.
Updates to the Dashboard "hero stats" widgets now highlight two "Coming Soon" features to create a more visually consistent experience.
We have removed Bitbucket as a Sign Up / Login option
The Reachability feature allows for users to see a prioritized list of vulnerabilities in an image based upon their level of severity, if they are considered to be fixable, and if they are “reachable” within the Container Profile views. After a container is profiled, packages that are observed to be running are considered Reachable Packages and should enable teams to better prioritize which vulnerabilities to focus on remediating.
A new Dashboard, recurring scanning, and Slack notifications for the images users care about. Users can add image:tags from their connected registries for us to continuously scan. We call these “watched images,” and they are listed on the Dashboard in the “Secured Images” table. The Dashboard displays some key stats about their coverage with Slim. We will scan image:tags for changes ad hoc (whenever a user runs a scan in the Portal) and at least daily.
You can authenticate with Slack and select a channel to send Vulnerability Diff information to on a per-image:tag basis.
Users can view a graphical vulnerabilities “burndown chart” when viewing container image profiles to assess how Slim has improved the security of their containers over time.
There was a bug that prevented AWS ECR users with an _ (underscore) as the "namespace" for their images has been resolved.
We have references to hardened Community Images to the Onboarding Search screen. These link to the image:tag pages for the images and allow users to take a deeper look into popular images that have been taken through the hardening process.
New users to the Slim product will experience a focused Onboarding experience that invites them to Connect a Registry right away, so that we can begin scanning and helping them secure their images.
New users who want to see what Slim offers prior to connecting a registry, will have the ability to quickly experience our scanning capabilities by searching for public images and viewing our Xray, Vuln, and Package scan information. The focus our our image:tag scan experience has changed from being container expert focused to security focused highlighting vulnerabilities over container composition. They will be sent through the onboarding flow on subsequent visits until they decide to Connect a Registry or until they join an Org via invitation.
Users who opt to Connect a Registry, will have access to a new Dashboard, recurring scanning, and Slack notifications for the images they care about. They can add image:tags from their connected registries for us to continuously scan. We call these “watched images,” and they are listed on the Dashboard in the “Secured Images” table. The Dashboard will also display some key stats about their coverage with Slim including the number of registries connected, the ratio of watched to unwatched repos, the ratio of watched to unwatched image:tags, and the total number of images we’ve scanned for them. We will scan image:tags for changes ad hoc (whenever a user runs a scan in the Portal) and at least daily.
You can authenticate with Slack and select a channel to send Vulnerability Diff information to on a per-image:tag basis.
Users can view a graphical “burndown chart” on the image:tag page for a given image:tag to see how it’s vulnerabilities have changed over time.
The new image profile overview page highlights key security information about your image. This page provides a summary of vulnerabilities, the packages impacted by high and critical vulnerabilities, and all of the other key information about the image. Deep dive into the image details and vulnerabilities using the left navigation tabs.
The new Harden section of the Slim Portal makes it easy to jump back into the hardening process where you left off. The Hardening in Progress tab displays all images that are in the process of being hardened. Once you mark a hardened image as complete, indicating that the hardened image can now replace the original image, we list that image in the Hardened tab.
The My registries tab now includes the Connected Registry table so that once you have added a connector, you can easily access all of your images from one place.
We have made some performance enhancements to our front end to decrease page load time, so that you can access our content quickly.
Our new, scalable navigation makes it easy to find what you need throughout the Slim Platform.
We have deprecated our current Collections feature as part of a larger effort to more effectively surface the images you care about. Stay tuned for more updates.
We’ve updated our homepage to improve the onboarding experience. Now, you can connect your registry, scan images using Trivy and Grype, and begin the hardening process directly from our homepage launch pad.
We’ve updated our method for pulling CVEs from the Grype database to ensure that we provide users with the most accurate CVE dataset (previously we pulled the largest CVE dataset from Grype). This will align Grype results on the Slim Platform with stand alone Grype results.
With this release, you can now view, download, and select the hardening artifacts collected during the instrumentation phase of hardening.
We’ve made it much easier to verify vulnerability reduction as a result of Slim's automated container hardening process. You can now run Trivy, Grype, Snyk, Prisma Cloud (Twistlock), or any 3rd-party scanner on your hardened images produced via Slim platform. You can also generate SBOMs using 3rd-party tools for these images with complete and accurate Package information.
Slim automatically generates an SBOM every time it scans or hardens one of your images. You can download the SBOM directly from the Packages tab for the scanned image. We currently provide SBOMs in the CycloneDX format, but other formats (including SPDX) are coming soon.
Attention Mac M-chip users! We now support profiling, instrumenting, and hardening for ARM-based containers. You will now be able to see ARM images in any Connected Registry and be able to harden them via the Portal or CLI. Note: This feature does not yet include cross-architecture (i.e., ARM to AMD) capabilities. Stay tuned for updates on multi-architecture improvements.
$1
');
field.innerHTML = formattedHtml;
});
});