The feature of container image scan detects high-risk and medium-risk system vulnerabilities, application vulnerabilities, malicious samples, configuration risks, and sensitive data in images. The feature also provides suggestions on how to handle these issues and end-to-end vulnerability management.

Limits

Container image scan is a value-added service provided by Security Center and must be separately purchased. Only users of the Advanced,Enterprise, Ultimate, and Value-added Plan editions can purchase container image scan. If you use this feature, you are charged based on the number of times images are scanned and the number of scanned images. The fee per scan for each image is USD 0.3.

Note Users of the Basic edition can upgrade Security Center to the Advanced, Enterprise, Ultimate, or Value-added Plan edition to purchase container image scan. Users of the Anti-virus edition can upgrade Security Center to the Advanced, Enterprise, or Ultimate edition to purchase container image scan.

Supported regions

Only the Container Registry instances in the following regions support container image scan: China (Hangzhou), China (Shanghai), China (Beijing), China (Shenzhen), China (Hong Kong), and Singapore (Singapore).

Items that can be detected

Item Detection Fixing Remarks
Image system vulnerability Supported Supported We recommend that you fix image system vulnerabilities at the earliest opportunity based on the fixing commands and impact descriptions provided by Security Center.
Image application vulnerability Supported Not supported We recommend that you fix image application vulnerabilities at the earliest opportunity based on the fixing commands and impact descriptions provided by Security Center.
Image baseline risk Supported Not supported We recommend that you handle image baseline risks at the earliest opportunity based on the baseline check details provided by Security Center.
Malicious image sample Supported Not supported We recommend that you handle malicious file samples at the earliest opportunity based on the information provided by Security Center. The information includes paths to malicious files.

Supported operating systems and versions

Operating system Operating system version that supports risk detection Operating system version that supports risk fixing
Red Hat
  • Red Hat 5
  • Red Hat 6
  • Red Hat 7
None
CentOS
  • CentOS 5
  • CentOS 6
  • CentOS 7
  • CentOS 7
  • CentOS 8
Ubuntu
  • Ubuntu 12.04
  • Ubuntu 14.04
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 18.10
  • Ubuntu 14
  • Ubuntu 16
  • Ubuntu 18
Debian
  • Debian 6
  • Debian 7
  • Debian 8
  • Debian 9
  • Debian 10
  • Debian 9
  • Debian 10
Alpine
  • Alpine 2.3
  • Alpine 2.4
  • Alpine 2.5
  • Alpine 2.6
  • Alpine 2.7
  • Alpine 3.1
  • Alpine 3.2
  • Alpine 3.3
  • Alpine 3.4
  • Alpine 3.5
  • Alpine 3.6
  • Alpine 3.7
  • Alpine 3.8
  • Alpine 3.9
  • Alpine 3.10
  • Alpine 3.11
  • Alpine 3.12
Alpine 3.9
Amazon Linux
  • Amazon Linux 2
  • Amazon Linux AMI
None
Oracle Linux
  • Oracle Linux 5
  • Oracle Linux 6
  • Oracle Linux 7
  • Oracle Linux 8
None
SUSE Linux Enterprise Server
  • SUSE Linux Enterprise Server 5
  • SUSE Linux Enterprise Server 6
  • SUSE Linux Enterprise Server 7
  • SUSE Linux Enterprise Server 8
  • SUSE Linux Enterprise Server 9
  • SUSE Linux Enterprise Server 10
  • SUSE Linux Enterprise Server 10 SP4
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server 12 SP5
None
Fedora Linux
  • Fedora Linux 2X
  • Fedora Linux 3X
None
openSUSE
  • openSUSE 10.0
  • openSUSE Leap 15.2
  • openSUSE Leap 42.3
None

References

Overview

View security information about containers

Use threat detection on Kubernetes containers

Use the runtime security feature to monitor ACK clusters and configure alerts