| 
 Learn about the new functional capabilities of Kaspersky Container Security.  | 
  | 
Hardware and software requirements Check the supported orchestration platforms, CI systems, available image registries, and user workstation requirements.  | 
   | 
Licensing Kaspersky Container Security Learn more about license types provided for Kaspersky Container Security.  | 
  | 
Installing Kaspersky Container Security Prepare for installation and install Kaspersky Container Security in a private or public corporate network.  | 
  | 
 Scan objects and receive information about detected vulnerabilities, malware, misconfigurations, and sensitive data.  | 
  | 
 Accepting risks identified by Kaspersky Container Security (vulnerabilities, malware, sensitive data, and misconfigurations) to change the security status of images.  | 
  | 
Security policies configuration Configure scanner policies, assurance policies, response policies, and runtime policies to conduct scans in accordance with your requirements.  | 
  | 
Image scanning from registries and integration with CI/CD During the project build in the CI system, run the Kaspersky Container Security scanner to check the objects in the repository for compliance with the enabled security policies.  | 
  | 
 Configure integrations with Telegram and email addresses to receive notifications about security events.  | 
  | 
Integration with Active Directory Configure user roles using data on groups from Active Directory  | 
Process control within containers Use container runtime profiles to control processes and applications inside containers.  | 
  | 
 Learn more about registration of user activity and storage of scan results.  |