What Is HSS?
HSS is designed to protect server workloads in hybrid clouds and multi-cloud data centers. It provides host security functions, Container Guard Service (CGS), and Web Tamper Protection (WTP).
HSS can help you remotely check and manage your servers and containers in a unified manner.
HSS protects your system integrity, enhances application security, monitors user operations, and detects intrusions.
Host Security
Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and defend against intrusions and web page tampering. There are also advanced protection and security operations functions available to help you easily detect and handle threats.
Install the HSS agent on your servers, and you will be able to check the server protection status and risks in a region on the HSS console.
Component |
Description |
---|---|
Management console |
A visualized management platform, where you can apply configurations in a centralized manner and view the protection status and scan results of servers in a region. |
HSS cloud protection center |
|
Agent |
NOTE:
|
Container Security
HSS provides container security capabilities. The agent deployed on a server can scan the container images on the server, checking configurations, detecting vulnerabilities, and uncovering runtime issues that cannot be detected by traditional security software. Container security also provides functions such as process whitelist, read-only file protection, and container escape detection to minimize the security risks for a running container.
Web Tamper Protection
Web Tamper Protection (WTP) monitors website directories in real time and restores tampered files and directories using their backups. It protects website information, such as web pages, electronic documents, and images, from being tampered with or damaged by hackers.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.