Ensuring the security of the container during runtime is the top priority in container security management and control. The traditional invasion detection methods are mainly aimed at the host or network level and existing protection methods cannot detect the attack behavior at the container level. The container security protection platform allows you to detect behaviors in the container. When container escape behavior, bouncing shell, port scanning, starting mining program, or starting remote Trojan horse program is found, the abnormal container is paused or an alarm is reported according to the preset policy, and the pod where the container is located is isolated or restarted.
Procedure
1. Log in to the CSG Console.
2. Select Container security > Real-time monitoring on the left navigation bar to go to the Real-time monitoring page.
3. On this page, click "Update the list" on the right side of the container list to obtain container information within the cluster in real time.