Skip to content

RapidFort Workshop Series - Part 1

CVE Visibility & 3-Step Remediation Workshop

A live, hands-on walkthrough of RapidFort’s platform: starting with the curated images catalog and a Kubernetes project where swapping images reduced risk from 203 CVEs to 8 medium, then deploying the runtime to inspect real workloads and justify “not-affected” findings with RF advisories. The session closes with the RBOM™ profiling workflow and hardening plan—removing unused components, shrinking images (example 531MB → 112MB projected), and maintaining posture across GKE/AKS/EKS/OpenShift with GitOps-friendly updates and 7-day curated-image patch SLAs.

Access the Full On-Demand Workshop

Key Highlights from the Workshop

Catalog to Near-Zero

Live demo of RapidFort’s curated catalog (13k+ images) and image swap workflow that cut a GKE project from 203 CVEs (15 critical, 27 high) to 8 medium—by replacing base/third-party images, no code changes.

Runtime Scanner Deployed

Deployed RapidFort runtime to selected namespaces (Argo CD, ingress-nginx, Postgres, Spring) to inventory running images, quantify risk per image, and surface CVE details directly in the UI.

RF Advisories Explained

Showed “RF advisory” decisions (e.g., Go toolchain example) with justification and third-party references—marking scanner-reported CVEs as not applicable in context for audit-ready reasoning.

RBOM Profiling Workflow

Outlined stubbing → test execution → Runtime Bill of Materials (RBOM™) → hardening flow to remove unused files/libs; demonstrated projected size drop 531MB → 112MB and ongoing runtime monitoring.

Start Secure, Stay Secure with RapidFort

Remediate 95% of CVEs Automatically
without Code Changes, OS Changes, or Pipeline Modifications