Kubernetes and container security
Managed Kubernetes protection by detecting vulnerabilities in containers and verifying cluster configurations
Vulnerabilities in containers
Cloud Advisor scans container images and identifies vulnerabilities in operating systems, packages and libraries. Cloud Advisor does not require a connection to the container registry and can scan even isolated clusters without network connectivity.
KSPM
The Kubernetes Security Posture Management module provides automated verification of cluster configuration against security best practices. Cloud Advisor provides the ability to formulate and enforce your own rules that resources in the cluster must satisfy.
Kubernetes CIS
Cloud Advisor verifies cluster compliance with the Kubernetes CIS standard, a list of recommendations for secure cluster configuration.