Kaspersky Container Security
- Kaspersky Container Security 2.0 Help
- About the Kaspersky Container Security platform
- Solution architecture
- Standard deployment schemes
- Preparing to install the solution
- Solution installation
- Installing the basic business logic module and scanner
- First launch of the Management Console
- Viewing and accepting the End User License Agreement
- Checking solution functionality
- Agent deployment
- Viewing and editing agent groups
- Configuring a proxy server
- Connecting to external data storage resources
- Installing private fixes
- Removing the solution
- Updating the solution
- Solution interface
- Licensing the solution
- Data provisioning
- Working with clusters
- View the list of clusters
- Namespaces in the cluster
- Pods in the cluster
- Visualization of cluster resources
- Working with images from registers
- Investigating security events
- Analyzing container forensics
- Searching container forensics
- Detailed information about a running process
- Detailed information about file operations
- Details information about network traffic
- Detailed information about detected malicious objects
- Restrictions on runtime policies
- Investigating container forensics while accounting for adjacent events
- Analyzing detected vulnerabilities
- Analyzing container forensics
- Integration with third-party resources
- Setting up integration with external image registries
- Minimum sufficient rights for integration with registries
- Working with public registries without authorization
- Adding integrations with external image registries
- Viewing information about integrations with registries
- Deleting integration with external registry
- Harbor integration
- Creating an integration upon Harbor request
- Viewing and editing the Harbor External Integration settings
- Rescanning
- Integration with CI/CD
- Artifact scanning in CI/CD processes
- Configuring integration with GitLab CI/CD
- Configuring integration with Jenkins CI/CD
- Configuring integration with TeamCity CI/CD
- Defining the path to container images
- Monitoring the integrity and origin of images
- Running the scanner in SBOM mode
- Running the scanner in lite SBOM mode
- Getting scan results in JSON or HTML format
- Specifying secrets when starting a scan
- Configuring integration with image signature validators
- Setting up integration with notification outputs
- Configuring LDAP server integration
- Configuring integration with SIEM systems
- Integrating with HashiCorp Vault
- Setting up integration with external image registries
- Security policies configuration
- Scanner policies
- Assurance policies
- Response policies
- Runtime policies
- Creating a runtime policy
- Editing runtime policy settings
- Managing container runtime profiles
- Managing runtime autoprofiles
- Deleting policies
- Compliance check
- Configuring and generating reports
- File Threat Protection
- Users, roles, and scopes
- Managing users
- About user roles
- Working with system roles
- Displaying list of roles
- About scopes
- Scopes and enforcement of security policies
- Switching between scopes
- Adding users, roles, and scopes
- Resetting password for user accounts
- Changing settings for users, roles, and scopes
- Removing users, roles, and scopes
- Using Kaspersky Container Security OpenAPI
- Security event log
- Information about the status of solution components
- Ensuring safety and reliability of components
- Managing the dynamics of data accumulation
- Backing up and restoring data
- Contacting Technical Support
- Sources of information about the application
- Limitations and warnings
- Vulnerabilities in third-party services
- Glossary
- Third party code information
- Trademark notices
- ATT&CK MITRE Terms of Use
Compliance check > Cluster security benchmarks compliance check > Configuring cluster check result display
Configuring how cluster scan results are displayed
Configuring how cluster scan results are displayed
To configure the display of cluster scan results:
- In the Compliance → Cluster benchmarks section, click the cluster name.
The solution will open a window with a detailed description of the results of scanning the selected cluster.
- Select the date and time of the scan. By default, the results of the last performed scan are displayed.
- If necessary, filter the scan results by severity and applicable cluster security benchmarks by doing the following:
- Click the filter icon (
) above the table.
- In the displayed sidebar, specify the following parameters of controls:
- For the Severity setting, select one or more of the severity buttons (Critical, High, Medium, and Low).
- For the Framework setting, select one or more buttons corresponding to the relevant benchmarks (All, MITRE, NSA/CISA).
- Click Apply.
The solution closes the sidebar and the test results table displays only the controls that match the selected parameters of controls.
By default, scan results are displayed for all severity levels and all cluster security benchmarks.
- Click the filter icon (
- If necessary, select the category or subcategory of controls that you want to display in the table. To do so:
- If you want to select a category of controls to display, click the category name above the results table.
- If you want to select a subcategory of controls to display:
- Expand the lists of subcategories under categories of controls by clicking the Expand subcategories link.
- Click the subcategory name in the above the results table.
Article ID: 286613, Last review: Jun 6, 2025