Updated on 2022-04-01 GMT+08:00

Scenarios

Checking Container Image Security

Vulnerabilities will probably be introduced to your system through the images downloaded from Docker Hub or through open-source frameworks.

You can use CGS to scan images for risks including image vulnerabilities, unsafe accounts, and malicious files. Receive reminders and suggestions and eliminate the risks accordingly.

Checking Container Runtime Security

Develop a whitelist of container behaviors to ensure that containers run with the minimum permissions required, securing containers against potential threats.

Meeting Compliance Requirements

Prevent intrusions and malicious code, making sure your container and system security meet compliance requirements.