Qualys Dataflow for Container Security 

The Qualys Dataflow for Container Security Connector automates the ingestion of container image and instance data from Qualys Container Security into Qualys Enterprise TruRisk Management for centralized risk analysis. By consolidating container asset information with vulnerability findings in a unified platform, security teams can prioritize remediation efforts more effectively and gain comprehensive visibility into container-based infrastructure risks.

The connector supports delta synchronization and bidirectional mapping between container security data models and the ETM risk management system, enabling teams to correlate container vulnerabilities with business context and organizational risk posture. This integration eliminates manual data silos between container security tools and enterprise risk management, allowing teams to make faster, more informed decisions about container security investments and remediation strategies.

Connector Details

High-level connector information and supported asset types.

Vendor Qualys
Product Name Container Security
Connector Category Assets (Container Image / Instance)
Asset Types Supported Container Image, Container Instance
Version 1.0.0
Integration Type API Integration (REST)
Direction Unidirectional (Container Security to Qualys ETM)
Delta Support Supported

Connection Settings

Authentication Details

Provide the following credentials in the connector configuration screen:

Name Key Type Description
BASE URL baseURL Drop
Down
Base URL of Container Security. Example:
https://gateway.qg1.apps.qualys.com
Authentication
Mechanism
Authentication
Mechanism
Drop
Down
Choose between Basic or OAuth.
Username Username String For Basic Authenitcation, provide the Qualys Container Security username
Password Password String For Basic Authenitcation, provide the Qualys Container Security password
Client ID Client ID String For OAuth Authenitcation, provide the Client ID
Client secret Client secret String For Basic Authenitcation, provide the Client Secret

API Endpoints

APIs used by the connector (use the Gateway URL configured in the connector when calling these endpoints):

Name Endpoint
Get Images https://<gateway_url>/csapi/v1.3/images/list
Get Instance https://<gateway_url>/csapi/v1.3/containers/list

Connector Configuration

Basic Details

  1. Login to Qualys ETM.
  2. Go to Connectors > Integration tab and locate the Container Security Connector.
  3. Click Manage from the ellipses menu.
  4. Provide a Name and Description for the connector.
  5. Enter authentication details (Gateway URL & credentials as required).
  6. Click Next to configure scheduling and profiles.

Schedule

Profiles following details:

  • Configure a Schedule: Single Occurrence or Recurring with start and end dates/times.
  • Assets value will be CONTAINER by default for container security connector.

Click Next.

Mapping Details

Transform Maps

The Container Security connector provides default data model transform maps for Container Image and Container Instance. The default transformation maps configured for the connector are fetched from the database and utilized during the execution of the connector profile to perform data transformation.

  1. Click Create New to add a new transform map.
  2. Provide a Transform Map Name, select Source Data Model, and select Target Data Model.
  3. Save the map or clone the default map from the quick menu.

Container Security Image - Transformation Map

The default transformation map configured for the Container Security Image – connector is used during connector execution:

Source Field Target Field
repo.0.registry asset.assetDetail.containerImageAssetClass.registry
repo.0.tag asset.assetDetail.containerImageAssetClass.tag
repo.0.repository asset.assetDetail.containerImageAssetClass.name
repo.0.repository asset.assetDetail.name
repo.0.repository asset.assetDetail.containerImageAssetClass.repository
sha asset.assetHeader.externalAssetId
sha asset.assetDetail.containerImageAssetClass.digest
architecture asset.assetDetail.containerImageAssetClass.architecture
uuid asset.assetHeader.vendorAssetId
size asset.assetDetail.containerImageAssetClass.sizeInBytes
layers[].size asset.assetDetail.containerImageAssetClass.layers[].sizeInBytes
layers[].sha asset.assetDetail.containerImageAssetClass.layers[].digest
layers[].createdBy asset.assetDetail.containerImageAssetClass.layers[].createdBy
created asset.assetDetail.containerImageAssetClass.creationDate

Container Security Instance - Transformation Map

The default transformation map configured for the Container Security Instance – connector is used during connector execution:

Source Field Target Field
portMapping.port asset.assetDetail.containerInstanceAssetClass.ports[].containerPort
portMapping.protocol asset.assetDetail.containerInstanceAssetClass.ports[].protocol
portMapping.hostport asset.assetDetail.containerInstanceAssetClass.ports[].hostPort
created asset.assetDetail.firstSeen
updated asset.assetDetail.lastSeen
uuid asset.assetHeader.vendorAssetId
sha asset.assetHeader.externalAssetId
name asset.assetDetail.containerInstanceAssetClass.image.name
sha asset.assetDetail.containerInstanceAssetClass.image.registry
name asset.assetDetail.name
host.hostname asset.assetDetail.containerInstanceAssetClass.host.name
host.ipAddress asset.assetDetail.containerInstanceAssetClass.host.ipAddress
state asset.assetDetail.containerInstanceAssetClass.status
state asset.assetHeader.status
customerUuid asset.assetHeader.customerId
containerId asset.assetDetail.containerInstanceAssetClass.id
stateChanged asset.assetDetail.containerInstanceAssetClass.startTime
ipv4 asset.assetDetail.containerInstanceAssetClass.privateIpv4Addresses[0]
ipv6 asset.assetDetail.containerInstanceAssetClass.privateIpv6Addresses[0]

Viewing Assets and Findings in ETM

  1. Navigate to Enterprise TruRisk Management > Inventory.
  2. Go to Assets > All Assets to and use the filter inventory.source: 'Qualys Container Security'

Container Security assets in ETM

  1. Navigate to Risk Management > Findings > Vulnerability.
    • Use filter: inventory .source:'Qualys Container Security’ and asset.subclass:'container-image'

Connector States

A successfully configured connector goes through the lifecycle states below.

Registered The connector is successfully created and registered to fetch data from the vendor.
Scheduled The connector is scheduled to execute a connection with the vendor.
Processing A connection is executed and the connector is fetching the asset and findings data.
Processed The connector has successfully fetched the assets; it may still be under process of fetching findings. The Processed state indicates the connector is configured and importing assets and findings. This process may take up to 2 hours for completion. Once it is done, you can find the imported data in Enterprise TruRisk Management (ETM).