Updated on 2022-04-01 GMT+08:00

How to Use CGS

Table 1 describes how to use CGS.

Table 1 Procedure of using CGS

No.

Step

Description

1

Enabling cluster protection

After protection is enabled, images and running containers on all nodes in a cluster can be checked in real time.

2

(Optional) Configuring security policies

Configuring security policies and applying the policies to an image can effectively prevent security risks in a running container.

3

Viewing vulnerabilities

Check the vulnerabilities on the image and determine whether to ignore the vulnerabilities.

Checking container runtime security details

View exceptions during the running of the container.