Views:

Configure security policies and Runtime Scanning rulesets, monitor vulnerability detections and security events, and access the Artifact Scanner for pre-runtime scanning of your Kubernetes clusters using the Container Protection screen.

The following table provides an overview the main sections in Container Protection.
Section
Description
Policies
Configure and manage policies that you can then assign to Amazon ECS and Kubernetes clusters.
Rulesets
Configure rulesets that you can apply to policies that are assigned to clusters with Runtime Scanning turned on
Compliance
Enable compliance scanning to scan your Amazon EKS clusters for security compliance issues and generate reports with actionable insights.
Important
Important
Compliance scanning is currently only supported on EKS clusters mapped within Trend Vision One to a connected AWS account. Real-Time Posture Monitoring must be enabled in that account, and the latest Container Security software must be installed.
Vulnerabilities
View vulnerabilities detected on clusters by Runtime Scanning.
Events
View policy violations detected by Runtime Security.
Container Image Scanning
Learn how to set up and deploy artifact scanners in your CI/CD pipelines. After artifact scanning is set up, you can view the scan results of registry image artifacts for vulnerabilities, malware, and secrets from this page.