Hi Hidemasa Oiwa,
Thanks for using Mendix on Amazon EKS. The short answer to your questions is ‘it depends’ – obviously this warrants a more nuanced explanation - First, you must filter the scanning results dismissing ‘false positives’ and ‘not exploitable issues’ – easily asses it by either consulting your scanning solution documentation or searching in a security vulnerability database. Second, once you have a filtered the list of vulnerabilities, prioritize them according to their criticality. Third, you must pinpoint if the vulnerability issue is caused by an OS library, Mendix module dependency, or something you have added yourself:
Keeping your software and services secured is a collective effort in which we all play an important role.
Hope this post addresses your questions.
Hi Hidemasa,
Carlos is best placed to answer this, but he’s out till Aug 30, so please be patient.
-Maarten