The Cisco Panoptica Jenkins plugin works with Jenkins at the CI stage to scan images for vulnerabilities. Results of the scan are sent to Panoptica, along with the image hash value (the image ID), where they can be viewed in the Workloads page. The results of these scans can be used as conditions for Runtime Policy rules, to permit or block workloads from running in environments depending on the vulnerability level of the image.
You can set a maximum permitted severity level for images scanned by the plugin. If vulnerabilities are found that exceed this level, the build will fail.
In the CD stage, the plugin generates the Cisco Panoptica ID, which is generated from the image hash, and metadata extracted from the image. The Panoptica ID is sent to the Panoptica server.
The plugin is opensource, and can be found at here, with instructions to download, install, configure, and use.
Updated 9 months ago