tencent cloud

Tencent Container Security Service

Release Notes
Product Introduction
Overview
Strengths
Use Cases
Features and Versions
Purchase Guide
Applying for Trial
Purchasing Pro Edition
Purchasing Image Scan
Purchasing Log Analysis
Getting Started
Operation Guide
Security Overview
Asset Management
Vulnerability Detection
Image Risk Management
Cluster Risk Management
Baseline Management
Runtime Security
Advanced Defense
Policy Management
Protection Switch
Alarm Settings
Log Analysis
Hybrid Cloud Installation Guide
Compromised Container Isolation
Log Field Data Parsing
Practical Tutorial
Mirror Vulnerability Scanning and Vulnerability Management
Troubleshooting
Offline Linux Client
Troubleshooting for Cluster Access
API Documentation
History
Introduction
API Category
Making API Requests
Network Security APIs
Cluster Security APIs
Security Compliance APIs
Runtime security - High-risk syscalls
Runtime Security - Reverse Shell APIs
Runtime Security APIs
Alert Settings APIs
Advanced prevention - K8s API abnormal requests
Asset Management APIs
Security Operations - Log Analysis APIs
Runtime Security - Trojan Call APIs
Runtime Security - Container Escape APIs
Image Security APIs
Billing APIs
Data Types
Error Codes
FAQs
TCSS Policy
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary

Glossary

PDF
Focus Mode
Font Size
Last updated: 2024-01-23 15:35:06

Container

A container is a lightweight virtualization technology. It can run everywhere once built. A Docker container is in essence a host process featuring namespace-based resource isolation, cgroup-driven resource limitation, and efficient file operations through copy-on-write.

TCSS

TCSS is a one-stop security solution and platform that protects containers against all kinds of risks throughout their lifecycle. It implements a closed loop of security from container security prediction, defense, and check to response.

Orchestration tool

The container orchestration tool provides a framework for managing large-scale containers and microservice architectures. It can be used in any environment where containers run.

Container escape

Attackers get certain permission to run commands in the container by hijacking the containerized business logic or through direct control. They leverage some means to further get certain permission to run commands on the host of the container.

Killing a container

A container process is quickly killed, usually when the container cannot be stopped.

Image repository

An image repository is used to store Docker images. A single image repository corresponds to a single Docker application and hosts different versions of the application to deploy TKE.

Docker image

A Docker image is a special file system. In addition to the required program, library, resource, and configuration files, it also provides some configuration parameters for the container runtime, such as anonymous volumes, environment variables, and users. An image does not contain any dynamic data, and its content will not change after the build.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback