tencent cloud

All product documents
Tencent Container Security Service
Compromised Container Isolation
Last updated: 2024-01-23 15:44:44
Compromised Container Isolation
Last updated: 2024-01-23 15:44:44
In case of container attacks in the business environment, such as container escape, viruses, trojans, infectious worms, horizontal detection or attacks by compromised containers, or malicious container pull by attackers due to cluster/node vulnerabilities or improper configuration, you need to quickly isolate the container network.
Note:
As isolating the container network may affect normal business operations, we recommend you first confirm that the container is risky and isolation is necessary to avoid intrusions.

Isolating the Container Network

You can use the container network isolation feature on the Runtime Security, Advanced Prevention, or Asset Management page. The effect may differ by module as shown below:
Module Name
Feature Details
Container escape
If the container is isolated successfully in case of a security event, the system will disconnect the container from the network and mark the security event as processed.
Reverse shell
Abnormal process
File tampering
High-risk syscall
Virus scanning
Isolating the container alone cannot eliminate virus or trojan risks. Therefore, after the container is isolated successfully in case of a security event, the system will disconnect the container from the network but will not mark the security event as processed. To change the event status, you need to have the viruses or trojans in the container automatically isolated or isolate them manually.


Runtime security or advanced prevention

1. Log in to the TCSS console and click Runtime Security > Container Escape on the left sidebar.
2. On the Container Escape page, select the target container and click Process in the Operation column.


3. Select Isolate the container, enter the remarks, and click OK.



Asset management

1. On the Asset Management page, click Container.
2. On the Container page, select the target container and click Isolate the container.


3. In the pop-up window, click OK.
Note:
If the container is isolated, it will be disconnected from the network.

Canceling Isolation of the Container Network

To recover the container network after processing the risks in the container, click More > Cancel isolation in the security event list on the Runtime Security or Advanced Prevention page, or click Asset Management > Container, select the target container, and click Cancel isolation.



Viewing the Container Isolation Status

The container isolation status is refreshed as one of the container asset attributes on the Runtime Security, Advanced Prevention, or Asset Management page. For example, if you successfully isolate the container network in the security event list on the Runtime Security > Container Escape page, you can see that the container is in the Isolated status in the list on the Asset Management > Container page. Similarly, if you isolate the container network in the list on the Asset Management > Container page, the status will be refreshed in the list on the Runtime Security or Advanced Prevention page.
You can click the container isolation status drop-down list above the list to filter container events.


Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon