Help Center/ Host Security Service/ User Guide/ Risk Management/ Cluster Environment Security/ Viewing and Handling Security Risks in a Cluster
Updated on 2025-08-26 GMT+08:00

Viewing and Handling Security Risks in a Cluster

Scenarios

HSS can present risks in the risk view or image view. This helps you comprehensively learn the risk status of the cluster environment and implement one-stop management of the cluster security posture.

  • Risk view: View all the scan results of a risk, for example, a system vulnerability, application vulnerability, emergency vulnerability, configuration risk, IaC risk, or security and compliance issue.
  • Cluster view: View the scan results of a cluster, including its system vulnerabilities, application vulnerabilities, emergency vulnerabilities, configuration risks, and security and compliance issues.

This section describes how to view and handle cluster security risks in the risk view and the cluster view.

Viewing and Handling Cluster Environment Risks in the Risk View

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > Host Security Service.
  3. In the navigation pane on the left, choose Risk Management > Cluster Environment.
  4. On the Risk View tab page, view and handle all types of security risks. They include:

    • System vulnerabilities
      OS vulnerability scan results.
      Figure 1 System vulnerabilities

      Click a vulnerability notice name to go to the vulnerability details page. You can view the notice details, CVE details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Application vulnerabilities

      Application software vulnerability scan results.

      Click a vulnerability notice name to go to the vulnerability details page. You can view the notice details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Emergency vulnerabilities
      The emergency vulnerability list shows all the vulnerabilities of this type that can be detected by HSS.
      Figure 2 Emergency vulnerabilities

      If the value of Affected Containers/Container Nodes is not 0 for an emergency vulnerability, there are containers or container nodes having emergency vulnerabilities. Click a vulnerability notice name to go to the details page. View the notice details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Configuration risks
      The configuration risk list shows all the configuration risks that can be detected by HSS.
      Figure 3 Configuration risks

      If the value of Affected Resources is not 0 for a configuration risk, there are Kubernetes resources having risks. Click a risk name. On the risk details page, view the suggestion and the information about affected resources, such as the resource names, namespaces, hit rules, and paths. You can rectify the configuration risks based on the information.

    • Security and compliance
      The security and compliance list shows all the issues of this type that can be detected by HSS.
      Figure 4 Security and compliance

      If the value of Affected Resources is not 0 for a security and compliance issue, there are Kubernetes resources having risks. Click a risk name. On the risk details page, view the suggestion and the information about affected resources, such as the resource names, namespaces, hit rules, and paths. You can rectify the security and compliance issue based on the information.

    • IaC risks

      IaC scan results.

      Figure 5 IaC risks

      If Risky is displayed in the Risk Level column of a file, the file is insecure. You can perform the following operations to view and handle the risks:

      1. Click View Details in the Operation column. On the details page, view the risks, description, and suggestions.
      2. Click a risk name. On the risk details page that is displayed, view the risk hit rule, risk path, and affected resources.
      3. Manually rectify the risks based on the information provided.

Viewing and Handling Cluster Environment Risks in the Cluster View

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > Host Security Service.
  3. In the navigation pane on the left, choose Risk Management > Cluster Environment.
  4. Click Cluster View.

    Figure 6 Cluster view

  5. If Risky is displayed in the Security Risks column of a cluster, hover the cursor over the cell to view the risk distribution. Click the number of a risk to go to the cluster risk details page.

    Figure 7 Risk distribution

  6. View and handle risks. They include:

    • System vulnerabilities
      OS vulnerability scan results.
      Figure 8 System vulnerabilities

      Click a vulnerability notice name to go to the vulnerability details page. You can view the notice details, CVE details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Application vulnerabilities

      Application software vulnerability scan results.

      Click a vulnerability notice name to go to the vulnerability details page. You can view the notice details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Emergency vulnerabilities
      The emergency vulnerability list shows the emergency vulnerabilities of container assets.
      Figure 9 Emergency vulnerabilities

      Click a vulnerability notice name to go to the details page. View the notice details, suggestions, and affected assets. You can fix the vulnerabilities based on the suggestions.

    • Configuration risks
      The configuration risk list shows all the configuration risks that can be detected by HSS.
      Figure 10 Configuration risks

      If the value of Affected Resources is not 0 for a configuration risk, there are Kubernetes resources having risks. Click a risk name. On the risk details page, view the suggestion and the information about affected resources, such as the resource names, namespaces, hit rules, and paths. You can rectify the configuration risks based on the information.

    • Security and compliance
      The security and compliance list shows all the issues of this type that can be detected by HSS.
      Figure 11 Security and compliance

      If the value of Affected Resources is not 0 for a security and compliance issue, there are Kubernetes resources having risks. Click a risk name. On the risk details page, view the suggestion and the information about affected resources, such as the resource names, namespaces, hit rules, and paths. You can rectify the security and compliance issue based on the information.