Scenarios
Checking Container Image Security
Vulnerabilities will probably be introduced to your system through the images downloaded from Docker Hub or through open-source frameworks.
You can use CGS to scan images for risks including image vulnerabilities, unsafe accounts, and malicious files. Receive reminders and suggestions and eliminate the risks accordingly.
Checking Container Runtime Security
Develop a whitelist of container behaviors to ensure that containers run with the minimum permissions required, securing containers against potential threats.
Meeting Compliance Requirements
Prevent intrusions and malicious code, making sure your container and system security meet compliance requirements.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot