Views:
Feature
Description
Runtime Security
Provides visibility into any activity of your running containers that violates a customizable set of rules.
Important
Important
Trend Micro recommends allocating at least an additional 0.5 vCPU and 1 GB memory to your ECS cluster node size on top of your existing requirements before enabling the Runtime Security feature.
Runtime Scanning
Provides visibility of operating system and open source code vulnerabilities that are part of containers running in clusters.
Important
Important
  • Vulnerability Runtime Scanning supports clusters with pure ARM64 CPU nodes or pure x86_64 CPU nodes. Mixed CPU modes are not supported.
  • Vulnerability Runtime Scanning occurs on all active images inside the ECS cluster, including both ECR and non-ECR images.
  • Container Security scans containers in an ECS cluster on a schedule (every 5 minutes). After finding a new uncached image, Container Security posts a scan request to the scan queue, which triggers a SBOM generation in the scan Lambda. This SBOM is uploaded to AsaaS for a vulnerability scan.

Procedure

  1. Go to Cloud SecurityContainer SecurityContainer Inventory.
  2. In the tree, click Amazon ECS, locate and click the cluster in the list.
  3. Turn on Runtime Security.
  4. Turn on Runtime Scanning.
  5. Click Save.