You are here: Getting Started (Tenable.io Container Security)

Getting Started

Last Updated: May 12, 2017

This user guide describes Tenable.io Container Security. Tenable.io Container Security stores and scans container images as they are built, before they reach production. It provides vulnerability and malware detection, along with continuous monitoring of container images. By integrating with the continuous integration and continuous deployment (CI/CD) systems that build container images, Tenable.io Container Security ensures every container reaching production is secure and compliant with enterprise policy.

If you deploy Tenable.io Container Security on premises, add api_key to the query string. You do not have to set the access key/secret key in the HTTP headers.

Tip: If you are new to Tenable.io Container Security, see the workflow to get started.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.