Views:

You can now move Kubernetes clusters between groups in Container Inventory

November 13, 2024 — Trend Vision One Container Security now enables you to move Kubernetes clusters between groups in Container Inventory. This facilitates more efficient management of your clusters.
For more information, see Container Inventory.
Cloud Security Container SecurityContainer Inventory

Runtime Malware Scanning now available in Container Security

November 13, 2024 — Trend Vision One Container Security now offers Runtime Malware Scanning to help you detect malicious software in your production containers. This new feature provides scheduled malware scans of running containers and threat detection to identify malware in your production environment. With this release, Container Security ensures comprehensive security coverage throughout your container lifecycle by actively monitoring for both vulnerabilities and malware threats in production workloads.
Cloud Security Container Security

CIS OpenShift benchmark scanning now available

October 31, 2024 — Trend Vision One – Container Security now supports compliance scanning with CIS benchmarks in your Red Hat OpenShift clusters. Assess and guarantee adherence to industry-leading security standards effortlessly, enhancing your OpenShift security posture.
For more information, see Compliance.
Cloud SecurityContainer SecurityContainer Protection

Create cluster-managed policies in Container Security

October 9, 2024—You can now interact directly with the Kubernetes API to create and manage Container Security cluster-managed policies and rulesets within your Kubernetes clusters. This integration facilitates seamless deployment of Container Security policies and rulesets with your GitOps workflows.
For more information, see Cluster-managed policies.
Cloud SecurityContainer SecurityContainer Inventory

Container Image Scanning now viewable from the Trend Vision One console

October 9, 2024—Container Security now supports access to detailed results and statistics for scanned artifacts on the Container Image Scanning page from the Trend Vision One console. View the scan results of registry image artifacts for vulnerabilities, malware, and secrets within your continuous integration (CI) or continuous delivery (CD) pipeline.
For information, see Container Image Scanning.
Cloud SecurityContainer SecurityContainer Protection

New APIs available for Cloud Posture

September 30, 2024 — The “Checks and Profiles” public APIs for Cloud Posture is now available on the Trend Vision One Automation Center. For more information, visit the Automation Center.

CIS Kubernetes benchmark scanning now available

September 24, 2024 — Trend Vision One – Container Security now supports compliance scanning with CIS benchmarks in your Kubernetes clusters. Assess and guarantee adherence to industry-leading security standards effortlessly, enhancing your Kubernetes security posture.
For more information, see Compliance.
Cloud SecurityContainer SecurityContainer Protection

Container Inventory features Kubernetes group management

August 7, 2024 — Container Inventory allows users to organize their Kubernetes clusters into groups for enhanced control and streamlined management. Asset Visibility Scope supports this feature by allowing specific permissions to be assigned by groups, facilitating more efficient management of clusters.
For more information, see Container Inventory.
Cloud Security Container Security Container Inventory

Updated recommendations for Container Security policies and rulesets

July 16, 2024 — The recommendations for creating policies and rulesets for Container Security have been updated, including instructions for testing rules that are set to terminate or isolate, and an updated list of rulesets. For more information, see the Business Success portal.
Cloud SecurityContainer Security

Container Security now provides Terraform support

July 4, 2024 – Container Security now supports asset configuration and management with Terraform. For details, see the Vision One provider in the Terraform registry.
Cloud SecurityContainer Security
July 4, 2024 — The Container Inventory app now features filter and search functions to streamline the process to locate container services within the table view. Additionally, Container Inventory has implemented a page view, making it easier to navigate the list. These features encompass K8S elements such as Clusters, Nodes, Pods, and Containers, as well as ECS components including Clusters, Services, Tasks, and Containers.
For more information, see Container Inventory.
Cloud SecurityContainer Security

Enable runtime security and runtime scanning on multiple ECS clusters

July 1, 2024 – To improve the ECS cluster management in your AWS environment, Trend Vision One Container Inventory now allows you to enable or disable runtime security and runtime scanning on multiple Amazon ECS clusters.
For more information, see Container Inventory.
Cloud SecurityContainer Security

Scan for malware and secrets in Artifact Scanner

June 27, 2024 — Trend Micro Artifact Scanner (TMAS) now supports artifact scanning for malware and secrets. This helps to identify and manage sensitive and confidential data that might have been inadvertently exposed, like passwords and API keys. You can also integrate TMAS secret scan results with Trend Vision One - Container Security runtime policies to prevent secrets from reaching production environments.
For more information, see Artifact Scanner CLI.
Cloud SecurityContainer Security

Advanced search and filtering for Container Protection events

June 25, 2024 – Container Protection’s Events tab now features comprehensive search and filtering enhancements, allowing you to filter by action, operation, kind, and mitigation, and includes fuzzy matching for policies and namespaces. Experience new controls with multi-select options for cluster names and a custom time range feature to optimize your workflow across Deployment/Continuous, Kubernetes Runtime, and ECS Runtime environments.
Cloud SecurityContainer Security

Expanded search & filtering for Container Protection vulnerabilities

June 25, 2024 – Container Protection's Vulnerabilities tab now features advanced search capabilities and enhanced data presentation, including the addition of 'Image Name' and 'CVSS Score' in the Detail View. Streamline your security analysis with expanded filters like fuzzy matching, multi-select dropdowns, and time range selections, all sortable by severity and time metrics.
Cloud SecurityContainer Security

Secret scanning is now available in Container Security

June 25, 2024 — Container Security now supports secret scanning for container images. Secret scanning identifies sensitive and confidential data, such as passwords and API keys, that have inadvertently been publicly exposed. You can define whether to allow images to be deployed based on their scan results and configure the validity period of scan results.
Cloud SecurityContainer Security

CIS Amazon EKS benchmark scanning now available

June 12, 2024 — With Trend Vision One – Container Security, compliance scanning with CIS benchmarks in your EKS clusters is seamless. Assess and guarantee adherence to industry-leading security standards effortlessly, enhancing your Kubernetes security posture.
To learn more, see Compliance.
Cloud SecurityContainer Security

Container Security – Proxy support for ECS instances

May 6, 2024 — Container Security now supports proxy for Amazon ECS instances, providing a secure way to connect to the Trend Vision One backend.

Google GCP GKE now supported in Container Security and ASRM

March 27, 2024— Now Container Security can support Google GCP GKE. Just add Cluster in the Container Security app and install the Helm script into GKE according to our installation steps. You can see GKE's Cluster, Node, and Pod appear in the Tree view on the left. inside. If the user uses the Map to Cloud Account function, relevant information will also appear in the Attack Surface Risk Management app.

Microsoft AKS now supported in Container Security and ASRM

March 25, 2024—Container Security now supports Microsoft Azure AKS. Just add the cluster in the Container Security app and install the Helm script into AKS according to our installation steps. You can see AKS's Cluster, Node, and Pod appear in the Tree view on the left. inside. If the user uses the Map to Cloud Account function, relevant information will also appear in the Attack Surface Risk Management app.

Container Security updates Runtime Security to ensure access to future, larger rule updates

March 5, 2024 — The Runtime Security scout component has been updated to allow for the download of larger Runtime Security rule files. Customers should upgrade clusters that are running scout versions older than 2.3.26 (template version 1.0.8 for ECS) to the latest available version to ensure that they have access to new Runtime Security rules as they become available. Older versions of scout continue to receive rules and your existing installations retain their protection, but they cannot be updated as frequently with new rules due to file size limitations.
Instructions on upgrading Runtime Security:

Trend Vision One File Security

April 8, 2024 - Trend Vision One - File Security is a scanning service that can detect all types of malicious software (malware) including trojans, ransomware, spyware, and more. File Security now offers the following features and enhancements:
Feature Description
File Security Storage
File Security Storage provides anti-malware scanning on files in cloud storage services such as Amazon Web Services (AWS). This means you can integrate automated scanning into your continuous integration and continuous delivery and deployment (CI/CD) pipeline. Then effortlessly detect all types of malware including viruses, trojans, spyware, and more. See File Security Storage.
Enable Predictive Machine Learning (PML)
Trend Micro Predictive Machine Learning (PML) uses advanced machine learning technology to correlate threat information and perform in-depth file analysis. You can enable PML in File Security SDK using command line parameters. See Predictive Machine Learning in File Security.
Unlimited file size
You can now scan any size file. Previously, the file size limit was 1 GB.
Credit usage
File Security now requires credits to perform file scans. See Credit requirements for Trend Vision One apps and services.
Enhanced region support
File Security now supports ap-south-1.

Isolate and terminate Kubernetes containers

Dec 15, 2023 — Customers can now isolate or terminate potentially compromised Kubernetes pods when investigating threat incidents in Workbench, Observed Attack Techniques, and Search.
Cloud SecurityContainer Security

Public APIs for Container Security now available on Trend Vision One Automation Center

December 15 — Public APIs for Trend Vision One Container Security are now available on the Trend Vision One Automation Center. See the Automation Center for more information.

Container Security supports management scope

December 11, 2023 — For customers that have updated to the Foundation Services release, Container Security now supports management scope.
Permissions to view and manage Kubernetes clusters and Amazon ECS clusters can be assigned based on management scope for user roles. You can configure the management scope for each custom role in User Roles.
AdministrationUser Roles

Container Security – ARM64 CPUs now supported

November 30, 2023 — Container Security now protects containers running on ARM CPUs with runtime security and runtime vulnerability scanning.

Container Security – Proxy support for Kubernetes clusters

November 30, 2023 — Container Security now supports proxy for Kubernetes clusters, providing a secure way to connect to the Trend Vision One backend. For more information, see Proxy support for Kubernetes clusters

Trend Vision One Container Security

September 29, 2023 — Container Security helps safeguard your containers throughout their entire life cycle. Container Security is accessible directly in the Trend Vision One console, offering an intuitive and seamless experience for our customers.
Feature
Description
Artifact Scanning
Extended to support anti-malware scanning and used for admission control
Runtime Protection support
Extended support provides you the visibility into any activity on your running containers that violates your customizable set of rules, and the ability to mitigate issues
  • Extended to support Amazon ECS, on both EC2 and Fargate,
  • Extended to support Amazon EKS on Fargate
Cloud SecurityContainer Security

Trend Vision One Container Security

August 15, 2023 — Container Security helps safeguard your containers throughout their entire life cycle. Container Security is accessible directly in the Trend Vision One console, offering an intuitive and seamless experience for our customers.
Feature
Description
End-to-End Container Protection
Container Security ensures the security of your containers from build to termination and provides you peace of mind as your containers remain shielded against evolving threats at every step.
Multi-Platform Support
With the ability to deploy and protect both Kubernetes clusters (multi-cloud and on-premises) and Amazon ECS, Container Security ensures consistent security across diverse environments.
Amazon EKS Integration
Link your Amazon EKS Kubernetes clusters with your AWS cloud account to enhance risk discovery, assessment, and mitigation with Attack Surface Risk Management (ASRM).
Vulnerability Scanning extended to support Amazon ECS
Vulnerability scans have been extended to support Amazon ECS in addition to Kubernetes, allowing you to take proactive measures to secure your environment.
Cluster Inventory View
Gain a clear and organized overview of your clusters' inventory, making it easier to manage and track resources effectively, including clusters, nodes, and pods.
Policy Management and Event Viewing
Effortlessly manage policies and rules, and monitor events all from the Trend Vision One console, streamlining security operations and workflows.
XDR Detections and Investigation
Detect, track, and investigate cross-layer threats and activities with Container Security's Extended Detection and Response (XDR) capabilities.
Note
Note
XDR Detection and Investigation is available at no added cost during the pre-release preview but will become a separately licensed feature in the future.
Prioritized Vulnerability View
Prioritize the remediation of the most important risks with Attack Surface Risk Management, strengthening security posture by focusing on what matters most.
Cloud SecurityContainer Security