tencent cloud

Tencent Container Security Service

Release Notes
Product Introduction
Overview
Strengths
Use Cases
Features and Versions
Purchase Guide
Applying for Trial
Purchasing Pro Edition
Purchasing Image Scan
Purchasing Log Analysis
Getting Started
Operation Guide
Security Overview
Asset Management
Vulnerability Detection
Image Risk Management
Cluster Risk Management
Baseline Management
Runtime Security
Advanced Defense
Policy Management
Protection Switch
Alarm Settings
Log Analysis
Hybrid Cloud Installation Guide
Compromised Container Isolation
Log Field Data Parsing
Practical Tutorial
Mirror Vulnerability Scanning and Vulnerability Management
Troubleshooting
Offline Linux Client
Troubleshooting for Cluster Access
API Documentation
History
Introduction
API Category
Making API Requests
Network Security APIs
Cluster Security APIs
Security Compliance APIs
Runtime security - High-risk syscalls
Runtime Security - Reverse Shell APIs
Runtime Security APIs
Alert Settings APIs
Advanced prevention - K8s API abnormal requests
Asset Management APIs
Security Operations - Log Analysis APIs
Runtime Security - Trojan Call APIs
Runtime Security - Container Escape APIs
Image Security APIs
Billing APIs
Data Types
Error Codes
FAQs
TCSS Policy
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary

FAQs

PDF
Focus Mode
Font Size
Last updated: 2024-01-23 15:35:06

How do I protect the container security?

TCSS can quickly scan images and image repositories for various problems, including vulnerabilities, trojans, viruses, and sensitive information, to help you protect image security. It provides security features such as container escape, process allowlist/blocklist, and file access control to protect the container runtime security. It also offers security operations logs to assist you in visualizing container security.

How do I monitor the container health?

You can use the security operations feature of TCSS to visualize the container security information, and then leverage features such as security policy to improve the security operations quality and efficiency.

Does TCSS conflict with other security products?

No. Traditional server security products take effect only for the operating system layer and cannot identify security problems in containers. Traditional firewalls are mainly designed for the north-south traffic business model and cannot manage massive and complicated container environments at a fine granularity.

How often is the vulnerability library of TCSS updated?

TCSS gets vulnerability information from official sources in real time and updates the vulnerability library at a fixed time every day.

Can I use TCSS across regions?

No.

Can I deploy TCSS offline or across platforms?

Yes. For more information, see Hybrid Cloud Installation Guide.

What is the relationship between an image and a container?

An image is a read-only file that contains the environment and code necessary for a program to run. It is the basis for container running. Containers depend on images when they are started or created. Different containers can be created from different images or from the same image based on different parameters.
A container is a running instance created from an image. Each container can be enabled, started, stopped, or deleted. Containers are isolated from each other to secure application operations.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback