Basic security services for Alibaba Cloud ECS include features such as unusual logon detection and vulnerability scanning. You can view the real-time security status of your ECS instances in the ECS console or the Security Center console.
Background information
Alibaba Cloud Security Center provides basic security services for ECS instances free of charge. These services include vulnerability scanning, basic alert notifications, unusual logon detection, AccessKey pair leak detection, and compliance checks. You can view this security information on the Overview page of the ECS console or in the Security Center console. For more information, see What is Security Center?.
Billing
Note the following about the billing of basic security services:
The basic security services for ECS instances are free of charge. For more information, see Introduction to the Free Edition of Security Center.
To upgrade to the Premium or Enterprise Edition of Security Center, you can start a free trial or purchase the service in the Security Center console. For information about the billing of the Premium and Enterprise editions, see Billing overview.
Use the Security Center agent
The Security Center agent is a lightweight component installed on ECS instances. ECS instances without the agent are not protected by Security Center. Security data for these instances, such as vulnerabilities, alerts, baseline vulnerabilities, and asset fingerprints, is not displayed in the ECS console. For information about the installation paths of the Security Center agent, see Supported operating systems.
You can manage the Security Center agent in the following ways.
Automatically install the Security Center agent when you create an ECS instance
Go to ECS console - Instances. In the top navigation bar, select the target region and resource group.
Create an ECS instance. In the Image section, select Free Security Hardening. The system automatically installs the Security Center agent on the new ECS instance. For more information, see Create an instance using the wizard.
You can also set
SecurityEnhancementStrategy=Activewhen you call the RunInstancesManually install the Security Center agent on an existing ECS instance
For more information, see Install the agent.
Uninstall the Security Center agent
For more information, see Uninstall the agent.
View security status and fix security issues
To view the security status of an ECS instance and fix security issues, follow these steps.
Go to ECS console - Instances. In the top navigation bar, select the target region and resource group.
On the Instances page, find the target instance and click the
icon in the Monitoring column to open the Security Center console and view security reports.Go to the Security Center console to fix vulnerabilities and security alerts. For more information, see Fix vulnerabilities and Analyze and process security alerts.
Common security scenarios
For common vulnerability and security alert scenarios, see Vulnerability categories and scenarios and Security alert scenarios.
Set alert notifications
Basic security services support alert notifications for security alerts. Notifications are sent as internal messages. You can configure alert notifications as follows.
On the Overview page, hover over a pending task in the area and click Handle Now in the Security Protection area on the right to open the Security Center console.
In the navigation pane on the left, choose .
In the Alert section, select the alert levels, and configure the notification methods and schedule. For more information about security alert levels, see Risk levels of security alerts.
If you have upgraded to the Premium or Enterprise Edition of Security Center, see Overview of security alerts for Cloud Workload Protection Platform (CWPP) for more notification methods.
Risk levels of security alerts
Security Center classifies security alerts into the following risk levels:
Risk level | Description |
Urgent | Urgent alerts are triggered by behavior that causes damages or imposes persistent impacts on your assets. This type of behavior is similar to common attacks such as reverse shells. Urgent alerts indicate that your assets are probably under attack. We recommend that you view the details of the alerts and handle the alerts at the earliest opportunity. |
Suspicious | Suspicious alerts are triggered by behavior that causes damages or imposes persistent impacts on your assets. This type of behavior is similar to some O&M behavior such as suspicious addition of users. This type of behavior may also be involved in an attack path but is unnecessary. Your assets can be attacked even if this type of behavior is missing. For example, the deletion of the traces that are left by attacks is unnecessary in an attack path. Suspicious alerts indicate that your assets have a certain probability of being attacked. We recommend that you view the details of the alerts and check whether risks exist. If risks exist, handle the risks. |
Reminder | Reminder alerts are triggered by behavior that is unnecessary in an attack path. Your assets can be attacked even if this type of behavior is missing. This type of behavior is similar to some O&M behavior such as suspicious port listening. If you have high security requirements for your assets, pay attention to Reminder alerts. |