Container Security Release 1.41
December 02, 2025
Data Retention Service for Registry Schedules
Previously, Qualys Container Security allowed deletion of images and containers present in your account after a certain interval. With this release, an option to delete registry schedules is added to the Data Retention Policy page. Registry schedules older than the specified retention period with a status as 'FINISHED', 'CANCELLED', or 'FAILED' will be automatically deleted based on their last updated date.
With this release, if the Data Retention Policy is disabled, the default Data retention period for Sensors, Images, and K8S Admission Controllers is 13 months (390 days). Whereas, Containers and Registry Schedules will have a data retention period of 30 days and 90 days, respectively.
The retention periods of Registry Schedules are as stated below.
| Asset | Retention Period |
|---|---|
|
|
|
| - Sensors - Images - K8S Admission Controller |
Min. period - 7 days Max. period - 365 days |
| Containers | Min. period - 7 days Max. period - 30 days |
| Registry Schedules | For Active subscriptions Min. period - 7 days Max. period - 90 days For Expired subscriptions Max. period - 30 days |
|
|
|
| - Sensors - Images - K8S Admission Controller |
390 days (default) |
| Containers | 30 days (default) |
| Registry Schedules | 90 days (default) |
Enhancements in Registry Scan
As a part of Registry Scan enhancements, the Scan Jobs page (Assets > Registries > View Details) is renamed to Schedules. Since the Scan Jobs page represents information about Registry Scan Schedules, the more suitable name 'Schedules' is given to the page.
Continuous Assessment Configuration
Earlier, Qualys Container Security offered 'Continuous Assessment of Images' feature by default and you were allowed to disable it by contacting Qualys TAMs. With this release, we are providing the ability to enable or disable this feature through the Qualys Enterprise TruRisk™ Platform. To support this,

Static and Dynamic Scan Vulnerabilities Merge
Previously, Qualys Container Security used to override existing Static scan results if a Dynamic scan was run later. With this release, both Static and Dynamic Scan data are preserved.
This enhancement introduces a unified approach to vulnerability propagation between static scans and dynamic scans, providing greater flexibility and control for you. The feature ensures that vulnerability data is consistently propagated based on configurable flags at both the customer level and sensor profile level.
Upcoming Container Security QQL Standardization
Qualys is implementing standardization of the Qualys Query Language (QQL) across all its modules. As a part of this enhancement, both common and Qualys Container Security (K8s Container Security)-specific QQL tokens are getting updated with new token names that follow a standard, consistent nomenclature.
The standardized CS QQL tokens will be available to you in the upcoming Container Security 1.42 release.
The new token format (token name) will follow this syntax: entity.attribute[.subattribute…]
Below are some examples showing you new names of the existing CS QQL tokens.
| Existing Token | Standardized Token (CS 1.42 onwards) |
| created | asset.createdDate |
| containers | container.cluster.k8s.pod.container |
| status | container.cluster.k8s.pod.status |
| resourcePostures.dateEvaluated | container.k8s.resourcePostures.evaluatedDate |
For any queries, you can reach out to Qualys Support.