Product characteristics

asset management

Provides automated asset inventory, including key asset information such as containers, images, image warehouses, and hosts, to help enterprises visualize assets.

Image security

One click detection is provided for images and image warehouses, and multi-dimensional security scanning for vulnerabilities, trojans, trusted images, etc. is supported.

Runtime security

Adaptive identification of hacker attacks, real-time monitoring and protection of container runtime security, providing intrusion detection, container escape, black and white process list, file access control and other security functions.

Baseline Compliance

Based on the best security practices of Docker and Kubernetes of CIS Benchmark, provide one click detection and professional repair solutions.

Low resource consumption

One click deployment of lightweight agent, high performance, low CPU/memory consumption, compatible with multiple mainstream operating systems.

Application scenarios

  • Container image security
  • Meet the compliance of equal protection
  • Container Runtime Security

In view of the problem of image vulnerabilities emerging in endlessly, the container security service supports the detection of images submitted to the image warehouse by users, and generates reports and alerts when malicious images are found.

common problem

How to protect containers?

The container security service can provide one click detection for images and image warehouses, support multi-dimensional security scanning for vulnerabilities, trojans and sensitive information, and help users protect image security. At the same time, container security provides container escape, black and white process list, file access control and other security functions to protect container runtime security, and provides security operation logs to help enterprises achieve container security visualization.

How can I monitor the health of containers?

Is container security service in conflict with other security products?

How often is the vulnerability database of the container security service updated?

For more questions, please check common problem , or in Q&A Community Ask questions in.

According to our Getting Started Guide , you can use Tencent Cloud Container Security Service with just a few mouse clicks.