tencent cloud

All product documents
容器安全服务
Use Cases
Last updated: 2024-01-23 15:35:06
Use Cases
Last updated: 2024-01-23 15:35:06

Container image protection

Images are vulnerable to application vulnerabilities, viruses, trojans, and sensitive information leakage. TCSS supports thorough image checks throughout the lifecycle from build and shipping to running. It can detect security risks to images and control image running. It also allows you to customize rules to protect images.


Container escape attack detection

Containers are poorly isolated, and attackers can utilize sensitive path mounting and vulnerabilities to escape to the host, which directly affects the confidentiality, integrity, and availability of the underlying infrastructure. TCSS supports detecting a variety of escapes, such as:
Escape caused by the container running in privileged mode.
Container escape caused by dangerous mounting (mounting of the Docker socket and proc file system of the host).
Privilege escalation caused by the switch from a general account to a root account during the container process.
Capability privilege escalation during the container process.
Mount file namespace isolation broken during the container process.
Blocklist limits broken by seccomp syscall during the container process.
Modification of a host file not mounted to the container during the process (such as CVE-2019-5736).

Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon