- Service Overview
- User Guide
- Best Practices
-
FAQs
-
Technologies
- How Do I Enable Cluster Protection?
- How Do I Disable Cluster Protection?
- What Should I Do If the Shield on a Node Is Offline?
- What Should I Do If I Have No Service Authorization Permissions or Fail to Create an Agency as an IAM User?
- How Often Are CGS Vulnerability Libraries Updated?
- When Does CGS Update and Back Up Logs?
- Where Can I Find My CGS Logs?
- Does the Shield Plug-in of CGS Affect My Services?
- Product Consultation
- Pricing
- Regions and AZs
- Change History
-
Technologies
- General Reference
Show all
Copied.
Edition
- The enterprise edition provides a range of detection and monitoring functions, allowing you to protect your clusters and container runtime, detect and fix vulnerabilities, check for unsafe settings and malicious files, and configure security settings. The enterprise edition will be available if you purchase CGS quotas.
Function |
Item |
Enterprise (√: supported; ×: not supported) |
---|---|---|
Cluster protection |
Protects your clusters. |
√ |
Local image |
Scans for vulnerabilities in local images. |
√ |
Private image |
Scans for vulnerabilities in private images. |
√ |
Scans for malicious files in private images. |
√ |
|
Scans software in private images. |
√ |
|
Scans files in private images. |
√ |
|
Checks the settings of private images. |
√ |
|
Official image |
Scans for vulnerabilities in official images. |
√ |
Runtime security |
Detects escapes. |
√ |
Detects high-risk system calls. |
√ |
|
Detects abnormal programs. |
√ |
|
Detects abnormal files. |
√ |
|
Checks container environment. |
√ |
|
Security configurations |
Process whitelist |
√ |
File protection |
√ |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot