A containerized orchestration tool that serves as the central controller for the Cyber Hygiene vulnerability scanner.
The containerized brain of the Cyber Hygiene vulnerability scanner
This tool is used to deploy and manage the Cyber Hygiene vulnerability scanner within a Docker container environment, enabling automated vulnerability scanning and security management. It is primarily intended for security teams and system administrators who need a streamlined, containerized solution for vulnerability management and automation.
This repository serves as a skeleton project and example for containerizing the Cyber Hygiene vulnerability scanner; users should replace example image references with actual production images. Secure handling of credentials is recommended via Docker secrets rather than environment variables. The tool supports multiple architectures, making it versatile for diverse deployment environments.
Install Docker on your system
Install Docker Compose if using compose features
Pull the Docker image using: docker pull cisagov/example:0.0.1
Create a docker-compose.yml file with appropriate service, volume, environment, and port configurations
(Optional) Create secret files for sensitive data and configure them in docker-compose.yml
Start the container using Docker: docker run cisagov/example:0.0.1
Or start the container using Docker Compose: docker compose up --detach
docker run cisagov/example:0.0.1
Runs the Cyber Hygiene commander container directly via Docker.
docker compose up --detach
Starts the container in detached mode using Docker Compose.
docker compose pull
Pulls the latest image from Docker Hub to update the container.
docker stop <container_id>
Stops a running Docker container.