Product Advantages
-
Manage the security of all your container images in a Cloud Container Engine (CCE) cluster in a unified manner.
Manage the security of all your container images in a Cloud Container Engine (CCE) cluster in a unified manner.
-
Accurately detect over 100,000 container image vulnerabilities.
Accurately detect over 100,000 container image vulnerabilities.
-
Take advantage of the 10 types and 100 subtypes of built-in rules to detect and block escape attacks on containers.
Take advantage of the 10 types and 100 subtypes of built-in rules to detect and block escape attacks on containers.
-
The CGS agent runs as a container requiring minimal CPU and memory, never affecting the running of other containers.
The CGS agent runs as a container requiring minimal CPU and memory, never affecting the running of other containers.
Application Scenarios
Container Image Security
External images, including those downloaded from Docker Hub, contain vulnerabilities. Image vulnerabilities can also be inadvertently introduced through the use of open-source frameworks. It is time consuming to manually find and fix all the vulnerabilities.
Advantages
Container Runtime Security
Container behaviors are immutable. CGS helps enterprises develop a whitelist of container behaviors to ensure that containers run with the minimum permissions required and are secure against threats.
Advantages
Related Services
Functions
-
CGS scans running images and the images in your repositories, and provides suggestions on how to fix vulnerabilities and malicious files.
CGS scans running images and the images in your repositories, and provides suggestions on how to fix vulnerabilities and malicious files.
-
You can configure security policies, whitelist container processes, and set protected files to minimize the permissions required to run containers, improving system and application security.
You can configure security policies, whitelist container processes, and set protected files to minimize the permissions required to run containers, improving system and application security.
-
CGS monitors statuses of containers in nodes and can detect miners, ransomware, malicious processes, file modifications that violate container security policies, and container escape behaviors.
CGS monitors statuses of containers in nodes and can detect miners, ransomware, malicious processes, file modifications that violate container security policies, and container escape behaviors.
-
You can scan images in SWR for vulnerabilities, unsafe settings, and malicious code.
You can scan images in SWR for vulnerabilities, unsafe settings, and malicious code.
-
You can scan images in CCE for CVE vulnerabilities and other risks.
You can scan images in CCE for CVE vulnerabilities and other risks.
-
CGS periodically scans official Docker images for vulnerabilities.
CGS periodically scans official Docker images for vulnerabilities.
-
Alarms are triggered if non-whitelisted processes are started. This prevents abnormal processes, privilege escalation attacks, and violations.
Alarms are triggered if non-whitelisted processes are started. This prevents abnormal processes, privilege escalation attacks, and violations.
-
Read-only permissions can be configured for critical application directories (such as bin, lib, and usr directories) in the container to prevent tampering and attacking. If you set these directories to read-only, CGS will protect them from security threats such as file tampering.
Read-only permissions can be configured for critical application directories (such as bin, lib, and usr directories) in the container to prevent tampering and attacking. If you set these directories to read-only, CGS will protect them from security threats such as file tampering.
-
CGS uses rules and machine learning to accurately detect escape behaviors, including shocker attacks, process privilege escalations, Dirty COW, and brute-force attacks.
CGS uses rules and machine learning to accurately detect escape behaviors, including shocker attacks, process privilege escalations, Dirty COW, and brute-force attacks.
-
CGS can detect the startup of processes that violate security policies and malicious programs such as miners, ransomware, Trojans, and other viruses.
CGS can detect the startup of processes that violate security policies and malicious programs such as miners, ransomware, Trojans, and other viruses.
-
CGS scans for file access that violates security policies, detecting any sensitive file intrusions and tampering.
CGS scans for file access that violates security policies, detecting any sensitive file intrusions and tampering.
-
CGS checks for abnormal container runtime, including abnormal startup and improper configurations.
CGS checks for abnormal container runtime, including abnormal startup and improper configurations.