Security Center provides all-round security checks and protection capabilities to your assets deployed on Alibaba Cloud, multi-cloud environments, and data centers. Security Center provides the following editions: Basic, Anti-virus, Advanced, Enterprise, and Ultimate. This topic describes the features provided by Security Center and the differences in the features among these editions.

Note
  • If you require only the value-added features of Security Center, you can purchase the Value-added Plan edition of Security Center. The value-added features include web tamper proofing and anti-ransomware. You are charged only for the selected value-added features when you use the Value-added Plan edition. This edition provides the same basic services as the Basic edition.
  • The following symbols are used in the tables of this topic:
    • Not supported: indicates that the feature is not supported.
    • Supported: indicates that the feature is supported.
    • Value-added: indicates a value-added feature. You can use value-added features by enabling them when you purchase or upgrade Security Center.
    • Application required: indicates that the feature is available only when you successfully apply for the feature from Security Center.

Pricing

Billable itemBasicAnti-virusAdvancedEnterpriseUltimateValue-added Plan
Basic service feesFreeUSD 1 per core-monthUSD 9.5 per server-monthUSD 23.5 per server-monthUSD 23.5 per server-month + USD 1 per core-monthFree
Value-added service feesWeb Tamper ProtectionNot supportedUSD 165 per server-monthUSD 165 per server-monthUSD 165 per server-monthUSD 165 per server-monthUSD 165 per server-month
Anti-ransomwareNot supportedUSD 0.045 per GB-monthUSD 0.045 per GB-monthUSD 0.045 per GB-monthUSD 0.045 per GB-monthUSD 0.045 per GB-month
Log AnalysisNot supportedUSD 0.1 per GB-monthUSD 0.1 per GB-monthUSD 0.1 per GB-monthUSD 0.1 per GB-monthNot supported
Container image scanNot supportedNot supportedUSD 0.3 per imageUSD 0.3 per imageUSD 0.3 per imageUSD 0.3 per image
Cloud honeypotNot supportedUSD 333.33 per honeypot-monthUSD 333.33 per honeypot-monthUSD 333.33 per honeypot-monthUSD 333.33 per honeypot-monthUSD 333.33 per honeypot-month
Subscription durationUnlimitedMonthly subscription supportedMonthly subscription supportedMonthly subscription supportedMonthly subscription supportedMonthly subscription supported
  • On July 21, 2022, the basic fees for Security Center Ultimate is changed from USD 3 per core per month to USD 23.5 per server per month + USD 1 per core per month. You can no longer purchase the product expert service but you can still renew the product expert service that you purchased.
  • If you purchase Security Center Ultimate before July 21, 2022, you are charged when you renew, upgrade, or downgrade Security Center based on the original prices.
  • Starting from July 21, 2022, you are charged the basic fees for Security Center Ultimate in scenarios when you purchase Security Center Ultimate or upgrade Security Center to the Ultimate edition.Basic fees = USD 23.5 per server per month + USD 1 per core per month.

Overview

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Secure Score
Security Center evaluates your assets for vulnerabilities and assigns a security score which provides a reference on the security of your assets.
SupportedSupportedSupportedSupportedSupported

Assets

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
View information on the Cloud Asset Overview tab
Security Center provides an overview of your cloud assets, and allows you to view network topology, security score, and security risks. Security Center also provides a unified console where you can manage your cloud assets.
Not supportedNot supportedNot supportedSupportedSupported
Use the feature of container network topology
Security Center provides a GUI that simplifies the management of your assets such as clusters, containers, images, and applications. Security Center also displays the network topology of your container assets. This gives you a birds-eye view of the security status of your containers and the network connections between them.
Not supportedNot supportedNot supportedNot supportedSupported
Server list
Security Center displays security information about each protected server. This information includes the risk status, group, region, and virtual private cloud (VPC).
SupportedSupportedSupportedSupportedSupported
Use the asset fingerprints feature
Security Center collects the following types of server fingerprints:
  • Accounts

    Security Center collects information about server accounts and their permissions, and checks privileged accounts to detect privilege escalation activities.

  • Ports

    Security Center collects and displays port listening information to check open ports.

  • Processes

    Security Center collects and displays process snapshots to verify trusted processes and detect untrusted processes.

  • Middleware

    Security Center collects information about middleware of your assets.

  • Databases

    Security Center collects information about databases of your assets.

  • Web services

    Security Center collects information about web services of your assets.

  • Software

    Security Center scans software installation information and identifies affected assets when high-risk vulnerabilities are detected.

  • Scheduled tasks

    Security Center collects information about scheduled tasks of your assets.

  • Startup items

    Security Center collects information about startup items to help you quickly identify at-risk items.

  • Kernel modules

    Security Center collects information about kernel modules to help you quickly identify at-risk kernel modules.

  • Websites

    Security Center collects information about websites of your assets.

  • IDC probe findings

    If you install an IDC probe on a server in a data center, the IDC probe findings tab displays information about other servers in the data center. You can obtain an overview about the servers in the data center.

Not supportedNot supportedNot supportedSupportedSupported
Use the security check feature
After you perform a quick check task, Security Center performs checks such as vulnerability detection and baseline checks on specified servers based on your configurations.
Not supportedNot supportedSupportedSupportedSupported
Container security
Security Center provides the security statistics of your clusters, pods, containers, and images.
Not supportedNot supportedNot supportedNot supportedSupported
Cloud product security
Security Center displays the security information about cloud services. The information includes at-risk cloud services and their service types. The service types include Server Load Balancer (SLB) and ApsaraDB RDS.
SupportedSupportedSupportedSupportedSupported
Website security
Security Center displays security information about each protected website. The information includes the root domain, subdomains, risk status, and alerts.
SupportedSupportedSupportedSupportedSupported

Risk Management

Exposure Analysis

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Asset exposure analysis
Security Center visualizes the communication links between your Elastic Compute Service (ECS) instances and the Internet. Security Center also provides a central location that displays the vulnerabilities of your ECS instances as well as suggestions for handling them. You can quickly identify the exposures of your assets on the Internet.
Not supportedNot supportedNot supportedSupportedSupported

Vulnerabilities

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Linux software vulnerability management
Security Center compares software versions by using the matching engine of Open Vulnerability and Assessment Language (OVAL). Security Center generates alerts when the vulnerabilities that are recorded in the Common Vulnerabilities and Exposures (CVE) database are detected in the current version.
Supported (Only the automatic vulnerability detection feature is supported.)
SupportedSupportedSupportedSupported
Security Center supports the automatic fixing of system vulnerabilities and automatic creation of snapshots. This allows you to undo fixes by using snapshots.
Not supportedNot supportedSupportedSupportedSupported
Windows system vulnerability management
Security Center obtains Microsoft updates for Windows operating systems, detects high-risk vulnerabilities, and generates alerts for these vulnerabilities.
Supported (Only the automatic vulnerability detection feature is supported.)
SupportedSupportedSupportedSupported
Security Center automatically identifies pre-patches that are used to fix vulnerabilities to prevent failures caused by the lack of the required pre-patches. This allows you to fix Windows vulnerabilities with a few clicks. Security Center also generates alerts for vulnerabilities that require a system restart after the vulnerabilities are fixed. This allows you to fix Windows system vulnerabilities in an efficient manner.
Not supportedNot supportedSupportedSupportedSupported
Web-CMS vulnerability management
Security Center monitors web directories, recognizes common website builders, and checks the vulnerability database to identify vulnerabilities in website builders.
Supported (Only the automatic vulnerability detection feature is supported.)
SupportedSupportedSupportedSupported
Security Center uses patches developed by Alibaba Cloud to replace and modify source code. This allows you to fix vulnerabilities with a few clicks.
Not supportedNot supportedSupportedSupportedSupported
Urgent vulnerability management
Security Center detects urgent vulnerabilities when they are made public. Security Center does not support automatic fixing of urgent vulnerabilities. You must follow the instructions provided by Security Center to manually fix the vulnerabilities.
SupportedSupportedSupportedSupportedSupported
Application vulnerability management
Security Center detects weak passwords for system services and vulnerabilities in system services and applications.
Not supportedNot supportedNot supportedSupportedSupported
Scan for vulnerabilities
Security Center allows you to run quick scan tasks on your assets to detect vulnerabilities in real time.
Supported (Only the detection of urgent vulnerabilities is supported.)
Supported (The detection of application vulnerabilities is not supported.)
Supported (The detection of application vulnerabilities is not supported.)
SupportedSupported
Display of vulnerabilities that require immediate fixing
Security Center provides a centralized entry point for you to view and fix all vulnerabilities with high priorities.
Not supportedNot supportedSupportedSupportedSupported
YUM and APT source configuration
Security Center allows you to preferentially use YUM or APT sources maintained by Alibaba Cloud to fix vulnerabilities. After you turn on YUM/APT Source Configuration, Security Center automatically selects YUM or APT sources maintained by Alibaba Cloud. This improves the success rate of vulnerability fixing.
Note Before you fix a Linux software vulnerability, you must specify a valid YUM or APT source. If the YUM or APT source is invalid, the vulnerability fix may fail.
Not supportedNot supportedSupportedSupportedSupported

Baseline Check

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Server baseline check
Security Center dispatches tasks to check server configurations. Security Center generates alerts when configuration risks are detected.

Security Center allows you to specify check items, detection intervals, and servers to customize check policies. Custom check scripts are not supported.

Security Center allows you to customize weak password rules. Security Center checks the configurations of your cloud services by using a custom check policy. Security Center generates alerts when weak passwords are detected.

Security Center performs baseline checks on the following items:
  • High-risk exploits

    Security Center detects vulnerabilities in unauthorized operations in CouchDB or Docker.

  • Containers

    Security Center detects risks on Docker, Kubernetes Master, and Kubernetes Node.

  • Classified protection compliance

    Security Center performs security checks against Multi-Level Protection Scheme (MLPS) level 3, MLPS level 2, and Center for Internet Security (CIS) standards.

  • Best security practices

    Security Center performs security checks on Linux, Windows, and Redis.

  • Weak passwords

    Security Center detects weak passwords during logons, such as ApsaraDB for MongoDB, FTP, and Linux logons.

Not supportedNot supported
Supported (Only the detection of weak passwords is supported.)
SupportedSupported
container baseline checks
Security Center performs security checks on the baseline configurations of containers. It also generates alerts for the detected risks. Security Center detects the following items:
  • Alibaba Cloud Standard - Docker security baseline check

    Security Center checks the baseline against the Alibaba Cloud standard of best practices for Docker. This check covers different dimensions, such as security audit, service configurations, and file permissions. Security Center generates alerts at the earliest opportunity when risks are detected.

  • Alibaba Cloud Standard - Kubernetes-Master security baseline check

    Security Center checks the baseline against the Alibaba Cloud standard of best practices for Kubernetes Master.

  • Alibaba Cloud Standard - Kubernetes-Node security baseline check

    Security Center checks the baseline against the Alibaba Cloud standard of best practices for Kubernetes Node.

Not supportedNot supportedNot supportedSupportedSupported
Baseline risk fixing
Security Center mitigates risks that are detected from the baseline checks of Alibaba Cloud security and classified protection compliance.
Not supportedNot supportedNot supportedSupportedSupported

Configuration assessment

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Configuration assessment
Security Center detects risks in the configurations of Alibaba Cloud services, such as ECS and ApsaraDB RDS.
Security Center performs the following detection:
  • ECS

    Security Center checks whether the port access policies of security groups are excessively loose.

  • SLB

    Security Center detects for ports that are unnecessarily exposed to the Internet. This type of port increases attack risks.

  • RDS

    Security Center checks whether databases are accessible over the Internet and whether an access whitelist is configured.

  • ActionTrail

    Security Center checks whether auditing of operations logs is enabled. This type of audit facilitates event tracing.

  • MFA

    Security Center checks whether two-factor authentication is enabled. This type of authentication protects Alibaba Cloud accounts.

  • Other risks

    Security Center checks whether an SLB whitelist is configured and whether encrypted communications are enabled for ApsaraDB RDS.

Supported (Only specific check items are supported.)
Supported (Only specific check items are supported.)
Supported (Only specific check items are supported.)
SupportedSupported

AccessKey pair leaks

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Detection of AccessKey pair leaks
Security Center monitors code hosting platforms such as GitHub in real time to detect AccessKey leaks of Alibaba Cloud assets in source code.
SupportedSupportedSupportedSupportedSupported

Alerts generated by cloud honeypot

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Cloud honeypot
Security Center provides capabilities such as attack discovery and defense within and outside the cloud. You can create honeypots in VPCs and servers that are protected by Security Center. This protects the servers from attacks that are launched within and outside the cloud and reinforces the security of the servers.
Not supportedValue-addedValue-addedValue-addedValue-added

Detection and Response

Alerts

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Suspicious process
Security Center traces intrusion sources based on real attack-defense scenarios in the cloud and creates a process whitelist. Security Center generates alerts when unauthorized processes or intrusion attacks are detected.

Security Center builds approximately 1,000 process patterns for hundreds of processes and compares the processes against these patterns to detect suspicious processes.

Security Center performs the following detection:
  • Reverse shells

    Security Center detects suspicious command execution by Bash processes, and arbitrary command execution on servers under remote control.

  • Suspicious command execution in databases

    Security Center detects suspicious command execution in databases, such as MySQL, PostgreSQL, SQL Server, Redis, and Oracle.

  • Unauthorized operations in application processes

    Security Center detects unauthorized operations in application processes, such as Java, FTP, Tomcat, Docker container, and Lsass.exe processes.

  • Unauthorized system processes

    Security Center detects unauthorized system processes, such as PowerShell, SSH, Remote Desktop Protocol (RDP), Server Message Block Daemon (SMBD), and Secure Copy Protocol (SCP) processes.

  • Other suspicious processes

    Security Center detects activities of other suspicious processes, such as unusual access to Visual Basic Script (VBScript), unusual access to hosts, writing of crontab files, and webshell injection.

Not supportedSupportedSupportedSupportedSupported
Webshell
Security Center supports detection of website script files, such as PHP, ASP, and JSP files, based on both servers and networks.

Security Center performs the following detection:

  • Server-based detection

    Security Center monitors network directory changes on servers in real time.

  • Network-based detection

    Security Center captures webshell files and identifies network protocols to detect webshells.

Supported (The detection of some webshells is supported by the Basic edition.)
SupportedSupportedSupportedSupported
Security Center also supports webshell detection and removal, which allows you to manually quarantine detected webshell files. Files that are quarantined can be restored within 30 days.
Not supportedSupportedSupportedSupportedSupported
Unusual logon
Security Center provides basic detection services.

Security Center performs the following detection:

  • Logons from unapproved locations

    Security Center detects logons from unapproved locations. Security Center automatically records locations where logons to ECS instances are allowed. These locations can also be manually added. Security Center generates alerts when logons from unapproved locations are detected.

  • Brute-force attacks

    Security Center detects logons to ECS instances after multiple failed attempts. This may indicate that these ECS instances are compromised due to brute-force attacks.

SupportedSupportedSupportedSupportedSupported
Security Center provides advanced detection services.

Security Center performs the following detection:

  • Logons from unapproved IP addresses

    Security Center detects logons from unapproved IP addresses. Security Center allows you to specify approved IP addresses, such as the IP addresses of bastion hosts and the private networks of companies, from which users are allowed to log on to ECS instances. Security Center generates alerts when logons from unapproved IP addresses are detected.

  • Logons from unapproved accounts

    Security Center detects logons from unapproved accounts. Security Center allows you to specify approved accounts, with which users are allowed to log on to ECS instances. Security Center generates alerts when logons from unapproved accounts are detected.

  • Logons within unapproved time ranges

    Security Center detects logons within unapproved time ranges. Security Center allows you to specify approved time ranges, such as business hours, during which users are allowed to log on. If Security Center detects logons within unapproved time ranges, Security Center generates alerts. Security Center generates alerts when logons within unapproved time ranges are detected.

Not supportedNot supportedSupportedSupportedSupported
Tampering of sensitive files
Security Center monitors sensitive directories and files, and generates alerts if suspicious read, write, or delete operations are detected.
Security Center performs the following detection:
  • Tampering of system files

    Security Center checks whether Bash and ps commands are replaced or whether hidden and unauthorized processes are running.

  • Removal of core website files

    Security Center detects malicious removal of core website files after servers are attacked.

  • Trojan insertion

    Security Center checks whether malicious code is inserted into a website. If malicious code is inserted into a website, trojans are automatically downloaded when users visit the website.

  • Other suspicious activities

    Security Center checks whether ransomware tampers with the logon pages of Linux and MySQL and inserts emails or Bitcoin wallet addresses.

Not supportedSupportedSupportedSupportedSupported
Malicious processes
Security Center scans processes on a regular basis, monitors process startups, and detects viruses and trojans by using the cloud antivirus mechanism. You can terminate malicious processes and manually quarantine malicious files with a few clicks in the Security Center console.
The virus library that is used for cloud antivirus has the following characteristics:
  • Up-to-date virus data

    The virus library is deployed, maintained, and updated by Alibaba Cloud in real time. This minimizes the risk of potential losses caused by outdated virus data.

  • Diverse virus samples

    All types of viruses are covered. Security Center integrates major antivirus engines around the world. Sandboxes and machine learning engines developed by Alibaba Cloud are used.

Security Center performs the following detection:
  • Ransomware

    Security Center detects file-encrypting ransomware, such as WannaCry and CryptoLocker.

  • Attacks

    Security Center detects DDoS trojans, malicious scanning trojans, and spam trojans.

  • Mining software

    Security Center detects software that consumes resources and uses servers for cryptocurrency mining.

  • Zombies

    Security Center detects command and control (C&C) trojans, malicious C&C connections, and attack tools.

  • Other viruses

    Security Center detects worms, Mirai, and infectious viruses.

Not supportedSupportedSupportedSupportedSupported
Unusual network connection
Security Center monitors connections on servers and networks. Security Center generates alerts when suspicious connections are detected.
Security Center performs the following detection:
  • Suspicious connections to external IP addresses

    Security Center detects reverse shells and the Bash shell that establishes suspicious connections to external IP addresses.

  • Attacks

    Security Center detects maliciously inserted software that is used to launch attacks, such as SYN floods, UDP floods, and ICMP floods.

  • Suspicious communications

    Security Center detects suspicious webshell communications.

  • Suspicious TCP packets

    Security Center detects scan activities that are initiated on your server and targets other devices.

Not supportedSupportedSupportedSupportedSupported
Other features
Security Center performs the following detection:
  • Unusual disconnections of the Security Center agent
  • DDoS attacks
Not supportedNot supportedSupportedSupportedSupported
Suspicious Account
Security Center detects suspicious accounts that attempt to log on to your system based on user behavior analysis.
Not supportedSupportedSupportedSupportedSupported
Intrusion into applications
Security Center detects intrusion into applications, such as SQL Server.
Not supportedSupportedSupportedSupportedSupported
Cloud threat detection
Security Center detects unusual use of cloud services based on user behavior analysis. For example, an attacker uses your AccessKey pair to purchase a large number of ECS instances to mine data.
Not supportedNot supportedNot supportedSupportedSupported
Alerts of the Precision defense type
Security Center automatically blocks common Internet viruses, such as ransomware, DDoS trojans, mining and trojan programs, malicious programs, webshells, and computer worms.
Not supportedSupportedSupportedSupportedSupported
Persistent webshells
Security Center detects persistent webshells on servers.

After an attacker gains control over a server, the attacker typically places webshells, such as scripts, processes, and links, to persistently exploit the intrusion. Common persistent webshells include crontab jobs, automatic tasks, and system replacement files.

Not supportedSupportedSupportedSupportedSupported
Threats to web applications
Security Center detects intrusion activities that use web applications.
Not supportedSupportedSupportedSupportedSupported
Malicious script
Security Center detects malicious scripts on servers.

Malicious scripts are classified into file-based scripts and fileless scripts. After an attacker gains control over a server, the attacker uses scripts to carry out the actual attack. For example, the attacker may insert mining programs and webshells, and add administrator accounts to your system. Languages of malicious scripts include Bash, Python, Perl, PowerShell, Batch, and VBScript.

Not supportedSupportedSupportedSupportedSupported
Malicious Network Activity
Security Center identifies unusual network behavior based on logs, such as communication content and host behavior logs. Malicious network behavior includes intrusion into hosts over open network services and unusual behavior of cracked hosts.
Not supportedSupportedSupportedSupportedSupported
Threat detection during container runtime
Security Center detects threats to Container Service for Kubernetes in real time. The threats include viruses and malicious programs in containers or on hosts, intrusion into containers, and container escapes. Security Center also generates alerts for these threats and warnings for high-risk operations. Security Center detects the following threats for containers during container runtime and generates alerts for detected threats:
  • Malicious image startups

    Security Center dynamically monitors open image sources, such as Docker Hub, and generates alerts if an image that contains webshells or mining programs is installed on your server.

  • Viruses and malicious programs

    Security Center detects viruses, trojans, mining programs, malicious scripts, and webshells in containers.

  • Intrusion into containers

    Security Center detects intrusions into containers from attackers who exploit application-layer vulnerabilities, unauthorized operations in containers, and application-to-application spread of malicious scripts in containers.

  • Container escapes

    Security Center detects container escapes caused by improper container configurations, Docker vulnerabilities, or operating system vulnerabilities.

  • High-risk operations

    Security Center detects sensitive host directories mounted to containers, Docker API leaks, Kubernetes API leaks, and containers started based on suspicious privilege escalation. This minimizes the risk of attackers exploiting these vulnerabilities.

Not supportedNot supportedNot supportedNot supportedSupported
Alert archiving
This feature archives the alert events that are handled prior to 30 days ago and allows you to download the archived alert events. This facilitates event tracing and audit.
SupportedSupportedSupportedSupportedSupported

Threat analysis

The threat analysis feature allows you to manage security information and events of multiple cloud services that belong to different Alibaba Cloud accounts. The cloud services include Cloud Firewall and VPC. The feature allows you to focus on events and identify unknown threats. The feature also provides various context and tracing information, and supports one-click event handling to improve operational efficiency on events. For more information, see Threat analysis.

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Service integration
Security Center allows you to add the security information of multiple cloud services to threat analysis. The cloud services include Security Center, Cloud Firewall, Server Load Balancer (SLB), and VPC.
Not supportedValue-addedValue-addedValue-addedValue-added
Rule management
This feature provides various system rules to generate alerts and events when threats are detected. This feature also allows you to configure custom rules.
Not supportedValue-addedValue-addedValue-addedValue-added
Event handling
This feature analyzes collected security information, displays detected security events, and provides suggestions on handling the events.
Not supportedValue-addedValue-addedValue-addedValue-added
Alerting
This feature displays the aggregated alert data of multiple accounts and cloud services. You can view alerts in a centralized manner.
Not supportedValue-addedValue-addedValue-addedValue-added
Log analysis
This feature allows you to search for and view the aggregated logs of multiple accounts and cloud services.
Not supportedValue-addedValue-addedValue-addedValue-added

Attack Awareness

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Attack awareness
Security Center displays the details of web attacks and brute-force attacks on your server. Security Center traces the attacker IP addresses and finds the flaws of the attacks.
Not supportedNot supportedNot supportedSupportedSupported

Log Analysis

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Log analysis
Security Center allows you to retrieve and analyze raw log data. The data includes data related to process startup events, external network connections, system logon events, five tuples, DNS queries, security logs, and alert logs.
Note Only users of the Security Center Enterprise and Ultimate editions can view network logs. Users of the Security Center Anti-virus or Advanced edition cannot view network logs. On the Log Analysis page of the Security Center console, users of the Anti-virus or Advanced edition can view only security and host logs.
Not supportedValue-addedValue-addedValue-addedValue-added

Host Protection

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Agentless detection (Public preview)
The agentless detection feature adopts the agentless technology to scan and then detect security risks on ECS instances, precluding the need to install the Security Center agent.
Not supportedNot supportedSupportedSupportedSupported
Anti-ransomware
The anti-ransomware feature allows you to back up and restore data on your servers and databases. This protects your servers and databases from ransomware.
Not supportedValue-addedValue-addedValue-addedValue-added
Use the virus detection and removal feature
The security experts of Security Center conduct automated analysis on attack methods based on a large number of persistent virus samples. Then, the security experts release an engine that can detect and remove viruses based on machine learning results. You can use the engine to detect and remove viruses with a few clicks.
Not supportedSupportedSupportedSupportedSupported
Use the feature of web tamper proofing
Security Center monitors website directories and restores maliciously modified files or directories by using backups. Security Center protects websites from malicious modification, trojans, hidden links, and insertion of violence or pornography content.
Not supportedValue-addedValue-addedValue-addedValue-added
Use the host-specific rule management feature
The malicious behavior defense feature provides system rules and allows you to create custom defense rules. You can use the rules to enhance the security of your servers.
Not supportedNot supportedSupportedSupportedSupported
The feature of defense against brute-force attacks allows you to configure a defense rule to protect your servers from brute-force attacks. If the number of logon failures from an IP address to the same server exceeds a specified limit during a specified statistical period, the IP address is blocked.
Not supportedNot supportedSupportedSupportedSupported
Security Center allows you to specify approved logon locations, IP addresses, time ranges, and accounts to identify unusual logons that may be initiated by attackers.
Supported (Only approved logon locations can be specified.)
Supported (Only approved logon locations can be specified.)
SupportedSupportedSupported

Container Protection

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Container image scan
Security Center detects the following image baseline risks, image vulnerabilities, and malicious image samples:
  • Image system vulnerabilities

    Security Center detects image system vulnerabilities to ensure that your images are secure and reliable.

  • Image application vulnerabilities

    Security Center scans container-related middleware to detect image application vulnerabilities and provides suggestions on vulnerability fixes. This ensures that images run in a secure environment.

  • Image baseline risks

    Security Center scans your containers to detect image baseline risks and provides suggestions on how to handle the risks.

  • Malicious image samples

    Security Center detects malicious image samples in your containers. This allows you to view the container risks and reinforces the security of your containers.

  • Sensitive image files

    Security Center detects sensitive data in common sensitive files and custom image files. Security Center supports various types of common sensitive files, including application configurations that contain sensitive information, general private keys of certificates, credentials for application authentication or logons, and credentials for cloud server providers.

Note Only image system vulnerabilities can be fixed with a few clicks. Image application vulnerabilities, image baseline risks, malicious image samples, and sensitive image files can only be detected.
Not supportedNot supportedValue-addedValue-addedValue-added
Use the feature of proactive defense for containers
Security Center provides the feature of proactive defense for containers. The feature allows you to detect risks on an image when you use the image to create resources in a cluster. The feature also allows you to create a container defense policy for a cluster. If an image hits the container defense policy, Security Center handles the image that is started in the cluster based on the action of the policy. The action can be Block, Alert, or Allow. This ensures that the image does not affect your business.
Not supportedNot supportedNot supportedNot supportedSupported
Use container escape prevention
The feature of container escape prevention detects high-risk operations from multiple dimensions such as processes, files, and system calls, and establishes protection barriers between containers and hosts. This effectively blocks escape behavior and ensures the runtime security of containers.
Not supportedNot supportedNot supportedNot supportedSupported
Untrusted process defense
Security Center provides the untrusted process defense feature to detect and block the startup of programs that are not included in the images of your containers during the running of the containers. The feature helps protect the container environment against malicious software intrusion.
Not supportedNot supportedNot supportedNot supportedSupported
Container file protection
The container file protection feature can monitor directories and files in containers in real time, and generate alerts or intercept tampering operations when the directories or files are tampered with. This prevents your applications from being inserted with illegal information or malicious code.
Not supportedNot supportedNot supportedNot supportedSupported
Container firewall
Security Center provides the container firewall feature. The feature delivers firewall capabilities to protect containers. If attackers exploit vulnerabilities or malicious images to intrude into clusters, the container firewall feature generates alerts or blocks attacks.
Not supportedNot supportedNot supportedNot supportedSupported
Use the container signature feature
Security Center signs trusted container images and verifies the signatures to ensure that only trusted images are deployed. This prevents unauthorized container images from being started and improves asset security.
Note Only Kubernetes clusters that are deployed in the China (Hong Kong) region support the image signature feature.
Not supportedNot supportedNot supportedNot supportedSupported
CI/CD-based container image scan
Security Center detects image risks in the project building stage on Jenkins and GitHub in an efficient manner and provides solutions to detected image risks. Image risks include high-risk system vulnerabilities, application vulnerabilities, viruses, webshells, execution of malicious scripts, configuration risks, and sensitive data.
Not supportedNot supportedSupportedSupportedSupported

Application Protection

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Application protection (Public preview)
The application protection feature is developed based on the Runtime Application Self Protection (RASP) technology. This feature can detect attacks and protects applications during application runtime.
Not supportedNot supportedNot supportedSupportedSupported

System Configuration

Playbook

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Use the playbook feature
Security Center provides the task management feature. You can run tasks to enable automatic fixing of vulnerabilities in multiple servers at a time.
Not supportedNot supportedNot supportedSupportedSupported

Reports

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Create a security report
Security Center allows you to specify report information. After you enable this feature, Security Center sends emails that contain security statistics to the specified recipients.
Not supportedNot supportedSupportedSupportedSupported

Feature Settings

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Enable features on the Host Protection Settings tab
Proactive Defense - Anti-Virus

This feature automatically blocks common network viruses, such as common ransomware, DDoS trojans, mining programs, trojans, malicious programs, webshells, and computer worms.

Not supportedSupportedSupportedSupportedSupported
Proactive Defense - Anti-ransomware (Bait Capture)

This feature uses bait to capture the new types of ransomware and analyzes the patterns of the new types of ransomware to protect your assets.

Not supportedNot supportedSupportedSupportedSupported
Proactive Defense - Webshell Protection

This feature automatically intercepts suspicious connections that are initiated by attackers by using known webshells. This feature also allows you to manually quarantine related files.

Not supportedNot supportedNot supportedSupportedSupported
Proactive Defense - Behavior prevention

This feature intercepts the abnormal network behavior between your servers and disclosed malicious access sources, which reinforces the security of your servers.

Not supportedNot supportedNot supportedSupportedSupported
Proactive Defense - Active defense experience optimization

If your server unexpectedly shuts down or the defense capability is unavailable, Security Center collects server data by using the kdump service for protection analysis. This enhances the protection capability of Security Center on an ongoing basis.

Not supportedNot supportedNot supportedSupportedSupported
Webshell detection

Security Center periodically scans web directories to detect webshells and trojans on your servers.

Not supportedSupportedSupportedSupportedSupported
Adaptive threat detection

If a high-risk intrusion is detected on your server after the adaptive threat detection feature is enabled, the Security Center agent on your server automatically runs in Safeguard Mode For Major Activities mode. This mode helps detect intrusions in a faster and more comprehensive manner.

Not supportedNot supportedNot supportedSupportedSupported
Protection modes
Security Center provides multiple modes to protect your server in different scenarios. You can configure the following protection modes to protect your server:
  • Basic Protection Mode. All editions support this mode.
  • High-security Prevention Mode. Only the Anti-virus, Advanced, Enterprise, and Ultimate editions support this mode.
  • Safeguard Mode for Major Activities. Only the Enterprise and Ultimate editions support this mode.
SupportedSupportedSupportedSupportedSupported
Enable features on the Container Protection Settings tab
Kubernetes threat detection
Security Center monitors the status of running containers in a Kubernetes cluster. This allows you to detect security risks and attacker intrusions at the earliest opportunity. Security Center detects the following items:
  • Suspicious instruction execution on a Kubernetes API server
  • Mounting of suspicious directories to a pod
  • Lateral movement among Kubernetes service accounts
  • Startup of a pod that contains a malicious image
Not supportedNot supportedNot supportedNot supportedSupported
Container escape prevention

The feature of container escape prevention detects high-risk operations from multiple dimensions such as processes, files, and system calls, and establishes protection barriers between containers and hosts. This effectively blocks escape behavior and ensures the runtime security of containers.

Not supportedNot supportedNot supportedNot supportedSupported
Enable features on the Agent Settings tab
Client protection

After you enable the client protection feature, Security Center automatically intercepts unauthorized agent uninstallation. This feature prevents the agent from being uninstalled by attackers or terminated by other software.

SupportedSupportedSupportedSupportedSupported
Local file detection

The local file detection engine performs security checks on new script files and binary files on your server. If threats are detected, the engine reports alerts.

Not supportedNot supportedNot supportedSupportedSupported
Enable features on the Other Settings tab
Global log filtering

The global log filtering feature ensures security, and helps you effectively use your log storage and improve operational efficiency.

Not supported
(The feature is supported after you purchase log storage capacity.)
(The feature is supported after you purchase log storage capacity.)
(The feature is supported after you purchase log storage capacity.)
(The feature is supported after you purchase log storage capacity.)
Security control

Security control allows you to configure the IP address whitelist. Requests initiated from IP addresses in the whitelist are directly forwarded to destination servers. This prevents normal network traffic from being blocked.

SupportedSupportedSupportedSupportedSupported
Access control

Resource Access Management (RAM) allows you to create and manage RAM users, such as individuals, system administrators, and application administrators. You can manage RAM user permissions to control access to Alibaba Cloud resources.

SupportedSupportedSupportedSupportedSupported
Installation and uninstallation of the Security Center agent
Security Center allows you to install and uninstall the Security Center agent.
SupportedSupportedSupportedSupportedSupported
Use the proxy access feature
The proxy access feature allows you to add the following types of servers to Security Center: ECS instances that are deployed in VPCs, servers that are deployed in data centers, and servers that are deployed in hybrid clouds and are inaccessible over the Internet. You can also use the feature to manage uplink traffic of the servers. Uplink traffic refers to traffic from servers to Security Center.
SupportedSupportedSupportedSupportedSupported
Multi-cloud asset access
This feature allows you to add third-party cloud servers and servers in data centers to Security Center for protection and management.
SupportedSupportedSupportedSupportedSupported
IDC probe
Security Center allows you to create IDC probes to scan servers and identify the servers that have the Security Center agent installed in a data center. Then, you can synchronize the information about the identified servers to the Assets module of the Security Center console. This way, Security Center can manage the servers in a centralized manner.
SupportedSupportedSupportedSupportedSupported
Use the feature of asset management rules
The asset management rules feature lets you configure rule conditions. You can manage servers that meet the specified rule condition by group or tag in a simple and efficient manner.
SupportedSupportedSupportedSupportedSupported

Notification Settings

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Use the notification feature
Security Center allows you to customize notification methods and alert severities of alert notifications. Security Center sends alert notifications by using text messages, emails, internal messages, or DingTalk chatbots.
Note Only the Enterprise and Ultimate editions of Security Center support DingTalk chatbots.
SupportedSupportedSupportedSupportedSupported

Multi-account Control

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Use the multi-account management feature
Security Center allows you to manage the assets of multiple members in the resource directory of your enterprise. You can monitor the security status of the members in real time.
SupportedSupportedSupportedSupportedSupported

Compliance

FeatureDescriptionBasicAnti-virusAdvancedEnterpriseUltimate
Security compliance check
Security Center checks whether your assets comply with classified protection regulations, including those on communication networks, region borders, computing environments, and management centers. Security Center also generates compliance reports.
SupportedSupportedSupportedSupportedSupported
ISO 27001 compliance check
Security Center checks whether your system meets ISO 27001 requirements from the aspects, such as asset management, access control, cryptography, and operation security.
SupportedSupportedSupportedSupportedSupported

Threat detection limits

When Security Center detects risks, it sends security alerts to you without delay. You can manage security alerts, scan for vulnerabilities, analyze attacks, and perform configuration assessment in the Security Center console. Security Center can also analyze alerts and automatically trace attacks. This reinforces the security of your assets. To protect your assets against attacks, we recommend that you regularly install the latest security patches on your server, and use other security services along with Security Center, such as Cloud Firewall and Web Application Firewall (WAF).

Note Due to the evolution of attacks and viruses, and the variation of workload environments, security breaches may occur. We recommend that you use the alerting, vulnerability detection, baseline check, and configuration assessment features provided by Security Center to protect your assets against attacks.