죄송합니다. 검색 내용과 일치하는 항목을 찾지 못했습니다.

원하시는 정보를 찾는 데 도움이 되도록 다음을 시도해 보십시오.

  • 검색에 사용하신 키워드의 철자가 올바른지 확인하십시오.
  • 입력한 키워드에 동의어를 사용하십시오. 예를 들어 “소프트웨어” 대신 “애플리케이션”을 사용해 보십시오.
  • 새로운 검색을 시작하십시오.
문의하기 Oracle Cloud에 로그인

Vulnerability Monitoring

Reduce risk from vulnerabilities in your OCI compute instances, OCI Registry (OCIR) stored container images, and DevOps Java builds with Oracle Cloud Infrastructure (OCI) vulnerability monitoring solutions. OCI’s solutions give you deeper and wider vulnerability coverage and integrate with existing security tools to speed up remediation and help you stay ahead of vulnerability issues.

Cloud vulnerability monitoring solutions

OCI Vulnerability Scanning Service

Receive alerts about unpatched vulnerabilities and open ports on cloud instances as well as vulnerabilities inside container images stored with Oracle Cloud Infrastructure Container Registry by using Oracle Cloud Infrastructure Vulnerability Scanning Service.

OCI Operating System Management

Manage and monitor updates and patches for operating system environments in Oracle Cloud instances, including instances managed by the Oracle Autonomous Linux OS management service. Oracle Cloud Infrastructure OS Management also provides options for discovering and monitoring resources in cloud instances.

Application Dependency Management

Detect security vulnerabilities in cloud application dependencies. Set the configuration in the "managed build" stage of a DevOps pipeline to break the build when risky vulnerabilities are found inside the build materials.

March 30, 2022

Identifying vulnerabilities in cloud container images

Jim Smith, Senior Product Manager, Oracle

Customers need security that is easier to implement and maintain—this is at the core of Oracle’s approach to cloud security. OCI Vulnerability Scanning Service has offered container image scanning via the OCI Container Registry console since its launch in March 2021. Customers can now choose to turn on container image scanning inside OCI Vulnerability Scanning Service for every repository in a compartment by checking a single box.

Read the complete post

Featured cloud security blogs

View all

Vulnerability Monitoring resources