Help Center/ Host Security Service/ Getting Started/ Purchasing and Enabling Container Security Protection
Updated on 2024-09-23 GMT+08:00

Purchasing and Enabling Container Security Protection

Scenario

A container cluster consists of a set of nodes. The HSS container edition uses nodes as protection units and provides functions such as container firewall, container cluster protection, and container image security scanning, helping enterprises solve container environment problems that cannot be achieved by traditional security software. For details about the server security protection functions provided by HSS container edition, see Product Functions.

This document uses a EulerOS 2.9 Huawei Cloud cluster node server as an example to describe how to purchase and enable container security protection.

Step 1: Purchase HSS Quota

  1. Log in to the management console.
  2. Click in the upper left corner and select the region and project.
  3. Click in the upper left corner of the page and choose Security & Compliance > HSS.
  4. In the upper right corner of the Dashboard page, click Buy HSS.
  5. Set the parameters for buying HSS as prompted.

    • Billing Mode: Select a billing mode as required. In this example, select Yearly/Monthly.
    • Region: Select the region where the server is located. In this example, select CN-Hong Kong.
    • Edition: Select Container.
    • Quantity: Set this parameter based on the number of container nodes. In this example, set the quantity to 1.
    • Specify other parameters as needed.

  6. In the lower right corner of the page, click Next.
  7. After confirming that the order, select I have read and agree to the Host Security Service Disclaimer.
  8. Click Pay Now and complete the payment.
  9. Click Host Security Service to return to the HSS console.

Step 2: Install an Agent

  1. In the navigation pane, choose Installation & Configuration > Server Install & Config.
  2. Choose Agents > Servers Without Agents.
  3. In the Operation column of the target server, click Install Agent. The Install Agent dialog box is displayed.

    Figure 1 Installing an agent

  4. Select and set the server verification information.

    • Server authentication mode: Select a mode. In this example, select Account and password mode.
    • Allow direct connection with root permissions: Whether to allow root direct connection. In this example, select this option.
      • Server Root Password: Set this parameter based on the server information.
      • Server Login Port: Set this parameter based on the actual server login port. In this example, set 22 port.
    Figure 2 Enter the server verification information.

  1. Click OK to start installation.
  2. Choose Servers With Agents page and view the agent status of the target server.

    If the Agent Status is Online, the agent is successfully installed.

Step 3: Enable Protection

  1. In the navigation pane, choose Asset Management > Containers & Quota.
  2. In the Operation column of a server, click Enable.
  3. In the dialog box that is displayed, select the mode.

    Set this parameter based on the edition of the purchased quota in Step 1: Purchase HSS Quota.

    • Billing Mode: Select Yearly/Monthly.
    • Edition: Select Container.

  4. Confirm the information, read the Container Security Service Disclaimer, and select I have read and agree to the Container Security Service Disclaimer.
  5. Click OK.
  6. If the Protection Status of the target server is Protected, the protection is enabled successfully.

    Figure 3 Viewing the protection status

Follow-Up Procedure

Enable server protection for container nodes.

HSS container edition provides some proactive functions for servers. These functions are not enabled or not completely enabled when container security protection is enabled. You can determine whether to use these functions based on your requirements, the following table Table 1 describes the functions.

Table 1 Container node protection functions

Function

Description

Container Image Security Scanning

The container image security scanning function scans for vulnerabilities and malicious files in images. You are advised to scan images periodically so that you can handle image security risks in a timely manner.

Ransomware Prevention

Ransomware is one of the biggest cybersecurity threats today. Ransomware can intrude a server, encrypt data, and ask for ransom, causing service interruption, data leakage, or data loss. Attackers may not unlock the data even after receiving the ransom. HSS provides static and dynamic ransomware prevention. You can periodically back up server data to reduce potential losses.

Ransomware prevention is automatically enabled with the container edition. Deploy bait files on servers and automatically isolate suspicious encryption processes. You can modify the ransomware protection policy. You are also advised to enable backup so that you can restore data.

Application Protection

To protect your applications with RASP, you simply need to add probes to them, without having to modify application files.

Application Process Control

HSS can learn the characteristics of application processes on servers and manage their running. Suspicious and trusted processes are allowed to run, and alarms are generated for malicious processes.

Virus scanning and removal

The function uses the virus detection engine to scan virus files on the server. The scanned file types include executable files, compressed files, script files, documents, images, and audio and video files. You can perform quick scan and full-disk scan on the server as required. You can also customize scan tasks and handle detected virus files in a timely manner to enhance the virus defense capability of the service system.

Container Cluster Protection

HSS can check for non-compliance baseline issues, vulnerabilities, and malicious files when a container image is started and report alarms on or block container startup that has not been unauthorized or may incur high risks.

You can configure container cluster protection policies to block images with vulnerabilities, malicious files, non-compliant baselines, or other threats, hardening cluster security.

Container Firewall

A container firewall controls and intercepts network traffic inside and outside a container cluster to prevent malicious access and attacks.