tencent cloud


Container Image Security Scanning

Last updated: 2022-01-17 18:37:51


    The Tencent Container Registry (TCR) Enterprise Edition supports security scanning of managed container images and can generate scanning reports, expose potential security vulnerabilities in container images, and provide suggestions for fixing them. Container image security is an important part of cloud native application delivery security. Timely security scanning of uploaded container images and blocking application deployment based on the scanning results can effectively reduce the risk of vulnerabilities in the production environment.

    The image security scanning feature is a built-in feature of image repositories. You can actively trigger the security scanning of the container image of the specified version after uploading the container image. Also, you can configure automatic scanning at the namespace level, so that newly pushed images in the namespace will be scanned automatically after upload. The current image security scanning service is based on the open-source Clair solution, and the relevant vulnerability information is from the official CVE vulnerability library and synchronized on a regular basis.


    Before using the image security scanning feature, you need to perform the following operations:


    Configuring the scanning policy

    1. Log in to the TCR console and select Namespace in the left sidebar.
    2. On the "Namespace" page, click the name of the instance for which you want to enable the image security scanning feature to go to the namespace details page.
    3. On the "Basic Information" page, set the security scanning configuration to Auto-scan, as shown in the figure below:

    Manually triggering scanning

    Step 1: Preparing a container image

    Refer to Basic Image Repository Operations to upload a container image and view the image on the version management page of the corresponding image repository.

    Step 2: Triggering image scanning

    Select a specific image version in the image repository and click Scan to trigger image scanning. At this time, the security level is displayed as "Scanning", as shown in the figure below:

    Step 3: Viewing the scanning results

    After security scanning is completed, the security level area will display the highest level and number of vulnerabilities in the current image. You can click to view the details of vulnerabilities, as shown in the figure below:

    When viewing the details of vulnerabilities, you can click a specific vulnerability ID to redirect to the details of the vulnerability so that you can assess its actual impact on business, as shown in the figure below:

    Step 4: Re-triggering scanning

    As the vulnerability library is updated regularly, you can refer to Step 2: Triggering image scanning to re-trigger the security scanning of the specified image and obtain the latest scanning results.

    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support