Qualys Kubernetes & Container Security: What’s New in the Release 1.39-1.42
Table of Contents
- Vulnerability Management and Asset Reporting
- End-of-Life/End-of-Support (EOL/EOS) Software Reporting
- Continuous Assessment and Registry Scanning Enhancements
- eBPF-Powered Threat Detection and Response Enhancements
- Shift-Left Security and QScanner Enhancements
- Compliance & Policy Enforcement Enhancements
- Other Enhancements
- Resources
- Contributor
In the world of Containers & Kubernetes, consistent and reliable reporting, given the ephemeral nature of container workloads, is a massive challenge at scale. At Qualys, we are committed to supporting our customers with new game-changing capabilities that enable noise-free risk prioritization, remediation, and resiliency against the latest threats.
Let’s take a look at the newest capabilities Qualys Kubernetes and Container Security offers.
Vulnerability Management and Asset Reporting
Qualys Locator Path
As containerized environments scale, you face growing difficulty in manually tracking individual containers, especially when hundreds or thousands of instances are listed independently. The lack of a hierarchical view makes organization and navigation increasingly complex.
Qualys Container Security now introduces Qualys Locator Path (QLP), a hierarchical, intuitive grouping framework that organizes Kubernetes containers based on their logical placement within the environment. Each container is assigned a unique QLP, allowing you to reliably track and differentiate containers—even when they originate from the same image.
QLP provides a flexible, structured, group‑by view of container/image and software assets, allowing you to:
- Easily navigate large container inventories
- View logical hierarchy
Account → Cluster → Namespace → Pod → Container - Reduce manual effort in tracking and correlating container instances
- Improve clarity in multi‑cluster and large‑scale Kubernetes environments
Vulnerability Page: Image Layer-Aware with De-Duplicated Visibility of Risk and Full Traceability
Modern container environments generate massive volumes of vulnerability findings across images, layers, and running containers, often leading to duplicated alerts, fragmented context, and slow triage. To address this, Qualys Container Security now introduces a new Layer-Aware Vulnerability Page in the left navigation, purpose-built to deliver a clean, de-duplicated view of risk with deep traceability.
With this new update, you can:
- Get a de-duped view of unique vulnerabilities
See vulnerabilities grouped by QID across Images, Software, and running Container QLPs, eliminating duplicate noise from shared layers and reused base images so teams can focus on real, unique risk. - Trace base layer vulnerabilities to the parent image
Quickly trace each vulnerability back to the exact layer, root, or parent image to understand whether it was inherited from a base image or introduced in the application layer. - Track running containers and affected software by vulnerability
Correlate vulnerabilities with images in use, running containers, and associated packages to understand real runtime exposure instead of static, scan-only context. - Prioritize with real-time threat context and hierarchical grouping
Leverage KEV, ransomware signals, and QLP-based hierarchical grouping to identify blast radius, prioritize exploitable risk, and accelerate triage with reduced MTTR.
TruRisk™ Widget For Clusters
Now you can aggregate and view your overall TruRisk™ score at the cluster level with the new widget, enabling you to prioritize and obtain a consolidated risk score.
Dashboard Scheduling and Reporting
With this capability, you can create dashboards aligned to different teams (based on tags) or to different metrics. From there, you can create on-demand scheduled reports that can be sent via email in PDF format.
End-of-Life/End-of-Support (EOL/EOS) Software Reporting
Qualys now reports EOL/EOS Software findings on images. Continuous updates across programming languages have made EOL and EOS software increasingly common, leaving known vulnerabilities unpatched and exposed to exploitation.
Leveraging the CSAM Software catalog, the dashboard can populate key EOL/EOS insights for image software.
Continuous Assessment and Registry Scanning Enhancements
Continuous Assessment: The Anti-Re-Scan Model
Traditional registry scanning can introduce challenges, such as time lags between vulnerability discovery and detection when performing point-in-time scans (e.g., weekly). Furthermore, weekly scans reset registry metadata and consume compute resources.
With Continuous Assessment, Qualys continuously assesses images against the latest vulnerability signatures without the need to do force/weekly re-scans. Continuously evaluating the SBOM helps achieve scale while maintaining safeguards against newly discovered exploitable vulnerabilities. You can customize the Continuous Assessment feature for specific images, including:
- Images that are forced to be rescanned (Note: If you have already configured Force Re-scan, Qualys is now doing Continuous Assessment against those images)
- Images with a special tag (qpa)
- Images in-use in running containers
- Any QQL (For example, you can do continuous assessment for images in a specific repo)
Continuous Assessment is opt-in. Users can go to the Configurations settings to turn on continuous assessment and configure how they want it to work.
Improved Registry Scan Job Visibility
With this release, Qualys Container Security has improved Registry Scan Job visibility to address the following challenges:
- Enhanced Scan Status Overview
You can now see the total number of images associated with each Scan Job, along with a clear breakdown of scans in progress and completed scans. - Image to Sensor Traceability
Each scanned image can now be traced back to the specific sensor (UUID) that performed the scan. This makes it easier to retrieve logs or results generated by that particular sensor for troubleshooting or audit purposes.
This enhancement provides greater transparency, faster issue resolution, and improved operational confidence in your registry scanning workflows.
eBPF-Powered Threat Detection and Response Enhancements
Qualys continues to invest extensively in eBPF-powered capabilities to protect against threats and malicious actors while bringing TruRisk™ to enable SecOps and Incident Response Teams to respond to the alerts that matter.
Enhancements include:
- Malicious Process and IP Communication Threat Detection: Using Deep Learning, Qualys inspects eBPF network events and maps them to malicious IP and DNS servers.
- Dedicated Investigate Page for Viewing Threats: Users originally had to go to the TotalCloud™ module to see container threat detections. Now, they can just click the Investigate Tab on the left.
- Integration with Attack Path: Runtime alerts are now integrated into attack paths and TruRisk™ scoring, enabling security teams to respond to attack paths with threat context.
- Rate Limiting and Event De-Duplication: Optimized eBPF rate limiting to reduce sensor overhead and improve sensor efficiency.
Shift-Left Security and QScanner Enhancements
QScanner, which is used for shift-left and developer workflows, has undergone major enhancements, including:
- Native Support for macOS: Developers can now scan images locally on their macOS laptops.
- Native Integration with GitLab: QScanner can be integrated into GitLab CI/CD pipelines.
- File Insight Scanning: The File Insight scan collects detailed metadata of files encountered during scans based on configured rules. The scan captures attributes such as file path, size, permissions, hashes, MIME type, origin layer (for images), and executable metadata (ELF/PE).
- On-Demand Upgrading: You can upgrade QScanner directly from the CLI.
Compliance & Policy Enforcement Enhancements
- New KSPM Compliance Report: Security teams can now create KSPM Compliance reports using the reporting wizard with proper evidence collection, inventory metadata, and remediation guidance.
- Deployment Scoped Policies For Admission Controller: Security teams can now enforce different policies within deployments/pods that are in the same namespace, allowing for more fine-grained scoping
- New Image Assessment Rules: New assessment rules include blocking images with secrets, malware, and those that are older, based on vulnerability date and author.
- KSPM – CIS Node Level Compliance For OpenShift and GKE
- KSPM – CIS GKE Autopilot Benchmarking
- Sealed Secrets Auditing In Red Hat OpenShift Environments
Other Enhancements
- Flex Columns: Users can select which columns they want to view in the UI.
- Sensor Enhancements:
- IPV6 SupportARM64 Support for eBPF Sensor and Qualys Admission Controller
- Ability to pull Qualys images from multiple registries/repositories using imagePullSecrets
- Data Retention Service Improvements:
- Ability to customize specific days for data retention. By default, containers are stored for 7 days and can be configured to store for up to 30 days.
- New Data Retention Service for registry schedules
- Image Metadata: Image Architecture and Repo Digest are now available for display in images.
Resources
- Learn more about TotalCloud Kubernetes & Container Security
- Speak to an expert about container security
- Get online help for TotalCloud Container Security
Contributor
Sachin Kesarkar








