Tencent Container Registry (TCR) Enterprise Edition supports security scanning of managed container images and generating scanning reports, exposing potential security vulnerabilities in container images, and providing suggestions for fixing the vulnerabilities. Container image security is an important part of cloud-native application delivery security. Timely and secure scanning of uploaded container images and blocking application deployment based on the scanning results can effectively reduce the risk of vulnerabilities in the production environment.
The image security scanning feature is a built-in feature of image repositories. Users can actively trigger the security scanning of the container image of a specified version after uploading the container image. Also, they can configure automatic scanning at the namespace level, so that newly pushed images in the namespace will be scanned automatically after upload. The current image security scanning service is based on the open-source Clair solution, and the relevant vulnerability information is from the official CVE vulnerability library and synchronized on a regular basis.
Before using the image security scanning feature, you must perform the following operations:
Refer to Managing Image Registry to upload a container image and view the image on the version management page of the corresponding image repository.
Select a specific image version in the image repository and click Scan to trigger image scanning. Then, the security level becomes "Scanning", as shown in the figure below:
After security scanning is completed, the security level area displays the highest level and number of vulnerabilities in the current image. You can view the details of the vulnerabilities, as shown in the figure below:
When viewing the details of vulnerabilities, you can click a vulnerability ID to view the details of the vulnerability so that you can assess its actual impact on business, as shown in the figure below:
As the vulnerability library is updated regularly, you can refer to Step 2: Triggering image scanning to re-trigger the security scanning of the specified image and obtain the latest scanning results.