Got it

Container Guard Service (CGS)

Latest reply: Jan 19, 2022 10:47:06 233 2 3 0 0

Container Guard Service (CGS) scans vulnerabilities and configurations in images, helping enterprises detect the container environment, which cannot be achieved by the traditional security software. CGS also delivers functions such as process whitelist configuration, read-only file protection, and container escape detection to minimize the security risks for a running container.


  • Image

    An image is a special file system. It provides not only programs, libraries, resources, configuration files but also some configuration parameters required for a running container. An image does not contain any dynamic data, and its content is unchangeable after creation.

  • Container

    A container is the instance of an image and can be created, started, stopped, deleted, and suspended.

Figure 1 describes the relationships between images, containers, and applications.
  • Multiple containers can be started for an image.

  • An application may include one or a set of containers.

Figure 1 Relationships between images, containers, and applications

Deployment Architecture

Figure 2 shows the CGS deployment architecture and Table 1 describes its key components.
Figure 2 CGS deployment architecture
Table 1 Key CGS components



CGS Container

Runs on each container node (host) to scan all container images on the node for image vulnerabilities, implement security policies, and collect exceptions.

Management Master

Manages and maintains CGS Containers.

Security Intelligence

Provides a security information knowledge base containing vulnerability and malicious program libraries, as well as big data AI training models.

Management console

Provides a console for users to use CGS.

  • x
  • convention:

Moderator Author Created Jan 17, 2022 05:00:20

very nice information you are share ..thankyou for it ...
View more
  • x
  • convention:

Created Jan 19, 2022 10:47:06

Great post as usual, thank for sharing
View more
  • x
  • convention:


You need to log in to comment to the post Login | Register

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits


Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Please bind your phone number to obtain invitation bonus.
Information Protection Guide
Thanks for using Huawei Enterprise Support Community! We will help you learn how we collect, use, store and share your personal information and the rights you have in accordance with Privacy Policy and User Agreement.