All Products
Search
Document Center

Security Center:Configure and run image security scans

Last Updated:Mar 31, 2026

Security Center scans your container images to detect system vulnerabilities, application vulnerabilities, baseline risks, malicious samples, sensitive files, and risks in image build instructions. This topic walks you through the complete workflow: configuring the scan scope, triggering scans, and monitoring task progress.

Prerequisites

Before you begin, ensure that you have:

If your Container Registry Enterprise Edition instance uses a virtual private cloud (VPC), select a vSwitch in a supported zone within a supported region. For the full list, see Supported regions and zones.

How it works

Security Center supports two scan modes and six risk detection categories.

Scan modes:

ModeDescription
Manual scanTriggered immediately by clicking Scan Now. All image types connected to Security Center are scanned unless you narrow the scope.
Periodic scanRuns automatically based on the scan cycle you configure. Applies to vulnerability, baseline, malicious sample, and sensitive file scans. Container runtime image scans do not support periodic mode.

Both modes use the same scan scope configuration. Configure the scope first, then choose when to run.

What Security Center detects:Log on to the Security Center console.

Detection categoryDescriptionSupported mode
System and application vulnerabilitiesCVEs in OS packages, middleware, web applications, and databasesManual, periodic
Baseline risksMisconfigurations against security benchmarksManual, periodic
Malicious samplesMining trojans, backdoor programs, and other malwareManual, periodic
Sensitive filesApplication credentials, certificates, keys, and cloud provider access keys in image layersManual, periodic
Image build instruction risksSecurity risks in Dockerfile instructionsManual, periodic
Container runtime image risksVulnerabilities in images running in live containersManual only

Quota consumption model:

Security Center identifies images by their digest value. If an image's digest does not change between scans, only the first scan consumes a quota unit. When the digest changes — meaning the image was rebuilt or updated — the next scan consumes an additional quota unit.

Each scan task has a fixed timeout of 4 hours. If a task includes more repositories than can be scanned within that window, remaining repositories are skipped. Specify the repositories you need before starting a scan, and increase the Throttling rate for Harbor repositories to avoid hitting the timeout.

Step 1: Configure the scan scope

Scan scope settings apply to both manual and periodic scans.

  1. Log on to the Security Center consoleSecurity Center console. In the top-left corner, select the region of the assets you want to protect: Chinese Mainland or Outside Chinese Mainland.

  2. In the left navigation pane, choose Protection Configuration > Container Protection > Container Image Scan.

  3. In the upper-right corner of the Container Image Scan page, click Scan Settings.

  4. In the Scan Settings panel, click the tab for the feature you want to configure.

The following sections cover each tab.

Configure scan parameters

On the Scan Configuration tab, set the following parameters:

ParameterDescription
Consumed quota/Purchased quotaThe number of scans performed versus the total purchased. If the quota is running low, click Scale Out to purchase more.
Scan CycleThe frequency for periodic scans. This setting has no effect on manual scans.
Scan ScopeThe image repositories to include. Click Manage, select repositories in the Image Management dialog box, and click OK. By default, Automatically Adds New Image Repositories For Scan is enabled — new repositories are automatically added to the periodic scan scope. Click the image icon to disable this if needed.
Scan Time RangeScans images based on their last local update time. If no update time is available, the local creation time is used. For example, with Last 7 Days selected, images last updated more than 7 days ago are excluded — the task status shows as successful, but with 0 successful scans.
Vulnerability Retention PeriodHow long periodic scan results are retained. Security Center automatically deletes results older than this period.

Manage image repositories

Click the Image Repository tab to view connected repositories:

  • acr and defaultAcr types: Container Registry Enterprise Edition instances automatically synced from your Alibaba Cloud account. These cannot be removed from the list.

  • harbor, quay, and gitlab types: Private repositories you have connected manually.

From this tab you can:

  • Add a repository: Click Add Image Repository to connect a private repository not yet in the list. For more information, see Add image repositories.

  • Remove a repository: In the Actions column for the target repository, click Remove, then click OK.

  • Set Harbor throttling: For Harbor repositories, click Edit in the Actions column and set the Throttling rate (images scanned per hour, default: 10). Increase this value if you have many images and need them all scanned within the 4-hour window. For example, a Harbor repository with 200 images at the default rate of 10 per hour takes 20 hours — exceeding the timeout, so many images would not be scanned. Setting it to 200 reduces that to 1 hour.

  • Monitor sync progress: Click Task Management in the upper-right corner and check the Container Asset Synchronization and Image Asset Synchronization tabs to confirm repositories are ready before running a scan.

Configure baseline checks

  1. In the Scan Settings panel, click the Baseline Configuration Management tab.

  2. Click Manage to the right of Configuration Scope.

  3. In the Baseline Check Scope panel, select the baselines to check, then click Confirm.

Important

The Access Key Plaintext Storage and Password Leakage baselines correspond to the AccessKey Leak Detection and Password Leak Detection switches in the Baseline Configuration Management tab. Selecting them here automatically enables the corresponding switches — no separate configuration is needed.

Once configured, the selected baselines are checked whenever you run a manual scan or a periodic scan starts.

Configure container runtime image scans

Container runtime image scans detect vulnerabilities in images running in live containers. Only manual scans are supported.

  1. In the Scan Settings panel, click the Container Runtime Image Scan tab.

  2. Click Configure Scan Scope. In the dialog box, select the cluster and application name to scan, then click OK.

  3. Click Scan Now to start the scan immediately.

After the scan completes, go to Task Management > Container Runtime Image Scan to view progress, then check the Image Vulnerability Risk tab on the Container Image Scan page for detected vulnerabilities.

Configure sensitive file scans

Security Center can detect sensitive data in image layers, including application configuration files with embedded credentials, certificates and keys, authentication tokens, and access keys from cloud providers.

Important

Sensitive file scans are static only — runtime detection is not supported.

  1. In the Scan Settings panel, click the Sensitive File Scan Settings tab.

  2. Click Manage to the right of Configuration Scope.

  3. In the Sensitive File Scan Settings panel, select the check items to include.

image
  1. Toggle the sensitive file detection switch to enable it.

When enabled, sensitive file scans run alongside vulnerability and baseline scans — both on Scan Now and during periodic scans.

Configure the at-risk file whitelist

If a specific sensitive file, build instruction risk, or malicious sample alert is expected or acceptable, add it to the whitelist. Security Center stops generating alerts for whitelisted items.

The whitelist is populated from alerts you dismiss on the Malicious Image Sample, Sensitive Image File, and Image Build Command Risks tabs. You cannot configure the whitelist before running your first scan.
  1. In the Scan Settings panel, click the At-risk File Whitelist Configuration tab.

  2. On the Sensitive File, Container Build, or Malicious Sample tab, find the target alert type and:

    • Edit: Click Edit in the Actions column, then set the whitelist scope to All Image Repositories or Current Image Repository Only.

    • Delete: Click Delete in the Actions column to remove the alert type from the whitelist. Security Center resumes detecting and alerting on that risk.

Configure automatic vulnerability fixing

Security Center can automatically fix system vulnerabilities in Container Registry Enterprise Edition (ACR Enterprise Edition) image repositories.

  1. In the Scan Settings panel, click the Image Risk Fixing Configuration tab.

  2. Click the Fixing Configuration switch to enable automatic fixing.

  3. Set the following parameters:

    ParameterDescription
    Fixing PeriodHow often Security Center applies fixes.
    Fixing ScopeWhich image repositories in your ACR Enterprise Edition instance to fix.
    Time RangeOnly images updated within this period are fixed. If an image has never been updated, its creation time is used. For example, with 7 Days selected, only images updated in the last 7 days receive fixes.

After enabling, Security Center applies fixes when a manual scan runs or when a periodic scan task starts. To check remediation status, go to Task Management > Image Remediation.

Configure the vulnerability whitelist

To exclude a specific vulnerability from scans, add it to the vulnerability whitelist. Security Center stops generating alerts for whitelisted vulnerabilities.

  1. In the Scan Settings panel, click the Vulnerability Whitelist Settings tab.

  2. Manage whitelist rules:

    • Create a rule: Click Create Rule, then configure the whitelist scope and applicable vulnerability types.

    • Edit a rule: Click Edit in the Actions column to update Rule Scope, Image Selection, or Note.

    • Delete a rule: Click Delete in the Actions column. Security Center resumes detecting and alerting on that vulnerability.

  3. Click the image icon in the upper-right corner of the Scan Settings panel to close it.

Step 2: Run an image security scan

With the scan scope configured, run a scan manually or rely on the periodic schedule.

Important

On the first scan, Security Center automatically creates a reverse endpoint in the VPC configured for your image. This endpoint lets Security Center access your Container Registry Enterprise Edition instance within the VPC. Do not delete it. For details, see Automatically created reverse endpoints.

Run an immediate scan

  1. Log on to the Security Center consoleSecurity Center console. In the top-left corner, select the region: Chinese Mainland or Outside Chinese Mainland.Log on to the Security Center console.

  2. In the left navigation pane, choose Protection Configuration > Container Protection > Container Image Scan.

  3. Click Scan Now.

  4. In the Quick Scan dialog box, all connected image types are selected by default. Deselect any types you do not want to include, then click OK. Only types already configured in Security Center appear in this dialog box.

    Image typeWhat is scanned
    acrContainer Registry Enterprise Edition instances created in the Container Registry console
    harbor, quay, gitlabPrivate repositories you have connected to Security Center
    ContainerContainer runtime images, based on your container runtime scan scope settings

Scan results appear in about one minute. Refresh the page to see the updated risk list.

Configure a periodic scan

  1. Log on to the Security Center consoleSecurity Center console. In the top-left corner, select the region: Chinese Mainland or Outside Chinese Mainland.Log on to the Security Center console.

  2. In the left navigation pane, choose Protection Configuration > Container Protection > Container Image Scan.

  3. In the upper-right corner, click Scan Settings.

  4. On the Scan Configuration tab, set Scan Cycle, then close the Scan Settings panel.

Security Center runs scans automatically based on the cycle you set, using the full scan scope configuration from Step 1.

Step 3: Monitor scan progress

  1. In the upper-right corner of the Container Image Scan page, click Task Management.

  2. In the Task Management panel, click the Image Scan tab.

  3. Review the progress and status of each task. Click Details in the Actions column to view the execution log — including which images failed and the reason for each failure.

image

What's next

After the scan completes, view and act on the detected risks. For more information, see View and handle detected image risks.

Appendix

Description of automatically created reverse endpoints

When you run an image security scan for the first time, Security Center automatically creates a reverse endpoint in the VPC configured for the image. This endpoint lets the Security Center service reach your Container Registry Enterprise Edition instance inside the VPC. For background on how reverse endpoints work, see How it works.

Do not delete this endpoint. It does not incur fees and does not affect any other Alibaba Cloud products.

If no image security scan runs in the VPC for one month, the reverse endpoint is automatically deleted. The next scan creates a new one automatically — no action required.

Supported regions and zones

The following tables list the supported regions and zones for VPCs and vSwitches used by Container Registry Enterprise Edition instances with the image security scan feature. If the configured VPC and vSwitch are not in these lists, image scanning is not available for that instance.

  • Public cloud

Region nameRegion IDSupported zonesZone nameZone ID
China (Qingdao)cn-qingdao2Qingdao Zone Bcn-qingdao-b
Qingdao Zone Ccn-qingdao-c
China (Beijing)cn-beijing10Beijing Zone Ccn-beijing-c
Beijing Zone Dcn-beijing-d
Beijing Zone Ecn-beijing-e
Beijing Zone Fcn-beijing-f
Beijing Zone Gcn-beijing-g
Beijing Zone Hcn-beijing-h
Beijing Zone Icn-beijing-i
Beijing Zone Jcn-beijing-j
Beijing Zone Kcn-beijing-k
Beijing Zone Lcn-beijing-l
China (Zhangjiakou)cn-zhangjiakou3Zhangjiakou Zone Acn-zhangjiakou-a
Zhangjiakou Zone Bcn-zhangjiakou-b
Zhangjiakou Zone Ccn-zhangjiakou-c
China (Hohhot)cn-huhehaote2Hohhot Zone Acn-huhehaote-a
Hohhot Zone Bcn-huhehaote-b
China (Ulanqab)cn-wulanchabu3Ulanqab Zone Acn-wulanchabu-a
Ulanqab Zone Bcn-wulanchabu-b
Ulanqab Zone Ccn-wulanchabu-c
China (Hangzhou)cn-hangzhou7Hangzhou Zone Bcn-hangzhou-b
Hangzhou Zone Fcn-hangzhou-f
Hangzhou Zone Gcn-hangzhou-g
Hangzhou Zone Hcn-hangzhou-h
Hangzhou Zone Icn-hangzhou-i
Hangzhou Zone Jcn-hangzhou-j
Hangzhou Zone Kcn-hangzhou-k
China (Shanghai)cn-shanghai8Shanghai Zone Acn-shanghai-a
Shanghai Zone Bcn-shanghai-b
Shanghai Zone Ecn-shanghai-e
Shanghai Zone Fcn-shanghai-f
Shanghai Zone Gcn-shanghai-g
Shanghai Zone Lcn-shanghai-l
Shanghai Zone Mcn-shanghai-m
Shanghai Zone Ncn-shanghai-n
China (Shenzhen)cn-shenzhen4Shenzhen Zone Ccn-shenzhen-c
Shenzhen Zone Dcn-shenzhen-d
Shenzhen Zone Ecn-shenzhen-e
Shenzhen Zone Fcn-shenzhen-f
China (Heyuan)cn-heyuan2Heyuan Zone Acn-heyuan-a
Heyuan Zone Bcn-heyuan-b
China (Guangzhou)cn-guangzhou2Guangzhou Zone Acn-guangzhou-a
Guangzhou Zone Bcn-guangzhou-b
China (Chengdu)cn-chengdu2Chengdu Zone Acn-chengdu-a
Chengdu Zone Bcn-chengdu-b
China (Hong Kong)cn-hongkong3Hong Kong Zone Bcn-hongkong-b
Hong Kong Zone Ccn-hongkong-c
Hong Kong Zone Dcn-hongkong-d
Singaporeap-southeast-13Singapore Zone Aap-southeast-1a
Singapore Zone Bap-southeast-1b
Singapore Zone Cap-southeast-1c
Malaysia (Kuala Lumpur)ap-southeast-33Kuala Lumpur Zone Aap-southeast-3a
Kuala Lumpur Zone Bap-southeast-3b
Kuala Lumpur Zone Cap-southeast-3c
Indonesia (Jakarta)ap-southeast-53Jakarta Zone Aap-southeast-5a
Jakarta Zone Bap-southeast-5b
Jakarta Zone Cap-southeast-5c
Philippines (Manila)ap-southeast-61Manila Zone Aap-southeast-6a
Thailand (Bangkok)ap-southeast-72Bangkok Zone Aap-southeast-7a
Bangkok Zone Bap-southeast-7b
Japan (Tokyo)ap-northeast-13Tokyo Zone Aap-northeast-1a
Tokyo Zone Bap-northeast-1b
Tokyo Zone Cap-northeast-1c
South Korea (Seoul)ap-northeast-22Seoul Zone Aap-northeast-2a
Seoul Zone Bap-northeast-2b
US (Silicon Valley)us-west-12Silicon Valley Zone Aus-west-1a
Silicon Valley Zone Bus-west-1b
US (Virginia)us-east-12Virginia Zone Aus-east-1a
Virginia Zone Bus-east-1b
Germany (Frankfurt)eu-central-13Frankfurt Zone Aeu-central-1a
Frankfurt Zone Beu-central-1b
Frankfurt Zone Ceu-central-1c
UK (London)eu-west-12London Zone Aeu-west-1a
London Zone Beu-west-1b
  • Finance Cloud

Region nameRegion IDCitySupported zonesZone nameZone ID
China (Shanghai) Finance Cloudshanghai-finance-1Shanghai4China (Shanghai) Finance Cloud Zone Fcn-shanghai-finance-1f
China (Shanghai) Finance Cloud Zone Gcn-shanghai-finance-1g
China (Shanghai) Finance Cloud Zone Kcn-shanghai-finance-1k
China (Shanghai) Finance Cloud Zone Zcn-shanghai-finance-1z
China (Shenzhen) Finance Cloudcn-shenzhen-finance-1Shenzhen2China (Shenzhen) Finance Cloud Zone Dcn-shenzhen-finance-1d
China (Shenzhen) Finance Cloud Zone Ecn-shenzhen-finance-1e
China (Beijing) Finance Cloud (Invitational Preview)cn-beijing-finance-1Beijing2China (Beijing) Finance Cloud (Invitational Preview) Zone Kcn-beijing-finance-1k
China (Beijing) Finance Cloud (Invitational Preview) Zone Lcn-beijing-finance-1l
  • Gov Cloud

Region nameRegion IDCitySupported zonesZone nameZone ID
China (Beijing) Gov Cloud 1cn-north-2-gov-1Beijing3China (Beijing) Gov Cloud 1 Zone Bcn-north-2-gov-1b
China (Beijing) Gov Cloud 1 Zone Ccn-north-2-gov-1c
China (Beijing) Gov Cloud 1 Zone Dcn-north-2-gov-1d