Skip to content

readhelper/docs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 

Repository files navigation

Use Cases

Twistlock’s comprehensive, purpose–built platform for container security provides full visibility and control over containerized environments, with tight runtime security controls(运行时安全控制) and intrusion prevention capabilities(入侵防御能力), at any scale(任何规模).

Runtime Defense

wistlock runtime defense protects your containers against exploits, compromises, program mistakes and configuration errors. We monitor container activities, detect policy violations, report anomalies and execute corrective actions. We do all this without changing your host, your containers, the container daemon, or your applications.

Vulnerability Management

Twistlock scans container images in registries, on dev workstations and on production servers for vulnerabilities and mis-configurations. We detect and report vulnerabilities in the Linux distro, app frameworks and even your customer app packages. The scanning tasks are seamlessly(无空隙地;无停顿地;) integrated with CI pipelines and existing processes.

Access Control

The Twistlock access control solution allows you to define and enforce fine-grained policies governing user access to Docker and Kubernetes resources. Extend existing policies or define net-new–our access control layer is both flexible and powerful enough to handle most enterprise use cases.

Compliance

With Twistlock, you can enforce standard configurations, container best practices, the use of trusted registries and recommended deployment templates. You will gain assurance that your containers environments wherever they reside, remain compliant with industry or company policies.

CI Integration

Twistlock integrates directly into your CI process so you can find and fix problems before they ever make it into production. Our continuous integration provides native plugins for popular CI tool platforms like Jenkins and TeamCity and a standalone scanner you can use with literally any other tool or workflow you have. Our plugins allow developers to see vulnerability status every time they run a build, without having to run a separate tool or use a different interface. Security teams can set policies that act as quality control gates to ensure only remediated images progress down the pipeline.

Security Analytics

Twistlock security analytics scans images and registries to detect vulnerabilities in the code as well as configuration errors. With security analytics, you can enforce standard configurations, container best practices and recommended deployment templates, wherever they reside, remain compliant with industry or company policies.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published