The Security Hub provides administrators with a comprehensive and centralized overview of the present security status of artifacts stored within the Harbor registry. Unlike the artifact-centric vulnerability view, the Security Hub provides a holistic view of all vulnerabilities across the registry and across all artifacts.
You can access the Security Hub via the Harbor UI Navigation or direct URL:
Method 1: Accessing the Security Hub via UI Navigation
Login to Harbor as a user with admin permissions, locate and click on the “Administration” option in the Harbor UI.
Within the Administration section, find and click on the “Interrogation Service” section.
The Security Hub tab can be found on the “Interrogation Service” settings page. Click on it.
Method 2: Accessing the Security Hub via Direct URL:
Open your web browser, and enter the following URL in the address bar: https://<harbor-domain>/harbor/interrogation-services/security-hub.
Note: Replace with the appropriate domain or IP address of your Harbor instance
The page title displays the total count of artifacts and scanned artifacts.
The first card shows the total number of vulnerabilities found in the scanned images. The total number is broken up into severity groups with their respective occurrences.
Top 5 Most Dangerous Artifacts
The second card shows the top 5 most dangerous artifacts found in scanned artifacts. It ranks the severe artifacts according to the number of vulnerabilities and their severity levels. Clicking on an artifact, the vulnerability table will query all vulnerabilities found in the selected artifact.
Top 5 Most Dangerous CVEs
The third card shows the top 5 most dangerous CVEs found in scanned artifacts. it sorts the dangerous CVEs by the number of artifacts and their severity levels found in the artifacts. When click the CVE, the search vulnerabilities table displays all vulnerabilities found in artifacts.
The search vulnerabilities panel allows you to search the vulnerabilities by the CVE ID, severity, project, repository, digest or tag etc. the search result will be shown in the table below.
Supported search fields:
Search vulnerability information by CVE ID, for performance consideration, cve_id condition is required to query the vulnerability info, support exact match
Search vulnerability information by severity level, support exact match
Search vulnerability information by cvss v3 score range
Search vulnerability information by project name, support exact match
Search vulnerability information by artifact digest, support exact match
Search vulnerability information by repository name, support exact match
Search vulnerability information by package name, support exact match
Search vulnerability information by tag name, support exact match