Quickstart guide

Container vulnerability management doesn't have to be complex. This guide will help you start using Root to automatically detect and remediate vulnerabilities in your container images in just a few minutes.



Prerequisites

Before diving into container remediation, ensure you have these essential components ready. Root requires:

  • Registry access with read/write permissions
  • Debian-Bookworm based images (AMD64 architecture)
  • Valid Root account credentials

Having these prerequisites in place will ensure a smooth onboarding experience.


Getting Started

Root streamlines the process of securing your container images through automated vulnerability detection and patching. Follow these steps to protect your first container:


  1. Connect Your Registry

    First, you'll need to link your container registry to Root. This secure connection enables Root to scan and remediate your images:

    • Navigate to the inventory page
    • Click "Connect to registry"
    • Enter registry credentials
    • Test connection with an existing image

  2. Select and Scan

    Once connected, you can begin scanning and remediating your container images. Root will automatically analyze and patch vulnerabilities:

    • Enter image repo/name:tag
    • Click "Let's Get Rooted"
    • Wait for scan completion

  3. Access Remediated Image

    After remediation, Root provides everything you need to start using your secured container:

    • Locate new image with "_rootio" suffix
    • Use provided Docker command to pull
    • View results in triage center


Important Notes

Understanding these key points will help you get the most out of Root's remediation capabilities:

  • All remediated images are automatically tagged with "_rootio" suffix for easy identification
  • Root applies both proprietary patches and upstream updates to maximize vulnerability coverage
  • The triage center provides detailed analysis of vulnerabilities and remediation actions
  • Real-time status updates appear in the lower-right corner during processing

Next Steps

After successfully remediating your first image, consider:

  • Setting up automated scanning for your most critical images
  • Reviewing the triage center to understand your vulnerability landscape
  • Exploring Root's advanced features for continuous container security

Getting Help

Our team is here to help you succeed with Root:

Root transforms container security from a manual burden into an automated, efficient process. Start securing your containers today at: app.root.io..