Updates are never blocked based on vulnerabilities. This is the default and most permissive setting.Use when: You want updates to always proceed, relying on other security measures.
any
Blocks updates if the new image contains any vulnerabilities at any severity level.Use when: You have a zero-tolerance policy for vulnerabilities.Example: New image has 1 low severity vulnerability → Update blocked
critical_high
Blocks updates only if critical or high severity vulnerabilities are found.Use when: You want to prevent serious vulnerabilities while accepting minor risks.Example: New image has 5 medium vulnerabilities → Update proceeds Example: New image has 1 critical vulnerability → Update blocked
critical
Blocks updates only if critical severity vulnerabilities are found.Use when: You want to balance security with update frequency.Example: New image has 2 high vulnerabilities → Update proceeds Example: New image has 1 critical vulnerability → Update blocked
more_than_current
Blocks updates if the new image has more total vulnerabilities than the currently running image.Use when: You want to ensure security posture never degrades.Example: Current: 5 vulns, New: 3 vulns → Update proceeds Example: Current: 5 vulns, New: 7 vulns → Update blocked
If current image has no scan data, update proceeds regardless.
Disabling auto-update: Setting enabled: false permanently deletes the configuration. Re-enabling requires creating a new configuration.
Vulnerability scanning: The vulnerabilityCriteria setting only takes effect if vulnerability scanning is enabled for the environment. Check environment scanner settings.
Testing schedules: Monitor the schedules list to verify your configuration is active.