Configure security policies and Runtime Scanning rulesets, monitor vulnerability detections and security events, and access the Artifact Scanner for pre-runtime scanning of your Kubernetes clusters using the Container Protection screen.
The following table provides an overview the main sections in Container Protection.
Section
|
Description
|
||
Policies
|
Configure and manage
policies that you can then assign to Amazon ECS and Kubernetes clusters.
|
||
Rulesets
|
Configure rulesets that
you can apply to policies that are assigned to clusters with Runtime Scanning turned
on
|
||
Compliance
|
Enable compliance
scanning to scan your Amazon EKS clusters for security compliance issues and
generate reports with actionable insights.
|
||
Vulnerabilities
|
View
vulnerabilities detected on clusters by Runtime Scanning.
|
||
Events
|
View policy violations
detected by Runtime Security.
|
||
Container Image Scanning
|
Learn how to set up and deploy artifact scanners in your CI/CD pipelines. After artifact scanning is set up, you can view the scan
results of registry image artifacts for vulnerabilities, malware, and secrets from
this page.
|