
Qualys Container Security (CS) provides continuous visibility, vulnerability management, and compliance monitoring for containerized environments across the build, deploy, and runtime stages.
Qualys Container Security provides comprehensive lifecycle protection for containerized environments—from image build to deployment and runtime—using native sensors and the Qualys Enterprise TruRisk™ Platform. It provides continuous discovery, inventory tracking, and real-time vulnerability and compliance assessments for container images, registries, and active containers. With support for CI/CD integration, it enables 'shift-left' enforcement through image scanning and admission controls before deployment. In runtime, it monitors file and process events, detects malware and secrets, and enforces policy-driven security across Kubernetes and Docker environments.
Discover and scan containers and images across Kubernetes, Docker, registries, and CI/CD for vulnerabilities, malware, secrets, and SBOM—prioritizing risks in active workloads.
Learn More →
Combine Attack Path Exposure with TruRisk scoring to focus on the most critical risk combinations. Use dynamic container tagging for resilience at scale.
Learn More →
Link OS, base image, and open-source package issues to application layers for developer or SecOps ownership. Automate remediation with ServiceNow integration.
Learn More →
Enforce security early with Admission Controller and CI/CD policies to block unsafe images and configurations before production.
Learn More →
Secure Kubernetes (EKS, AKS, GKE, OpenShift) by uncovering API, RBAC, and network gaps. Continuously monitor sensitive file access with integrated FIM for PCI 4.0.
Learn More →
Follow the Container Security Journey to understand how automated assessments and seamless script execution work.
Prerequisites
Before using CS, ensure the application is enabled for your subscription and the required Qualys Cloud Agent version is installed for Windows or Linux.
Learn More →Role-based Access Control (RBAC)
The Qualys Container Security application uses a Role Based Access Control (RBAC) model to control access to Container Security features.
Learn More →Sensor Configuration and Installation
The Qualys Container Security offers various sensors which allow you to scan your environments.
Learn More →Begin your journey with Qualys Container Security. Learn how to scan your containers.
Get the most out of your Qualys Container Security with these helpful resources.