Security Center is a cloud-native security platform that unifies asset management, mitigates security risks, and delivers threat detection, response, and source tracing across multicloud environments. By leveraging both lightweight agents and agentless detection, Security Center protects your servers, containers, and cloud products while helping you meet classified protection compliance requirements. This document describes the core features and billing models of Security Center.
Core concepts
Concept | Explanation |
Edition | In the subscription billing model, an edition represents the protection capabilities for a server. Higher editions include more features. |
Protection level | After you enable the pay-as-you-go feature for Host and Container Security, the protection level represents the mitigation capabilities configured for a server. Higher protection levels include more comprehensive features. |
Value-added service | In the subscription model, these are features that you must purchase separately. Examples include Vulnerability Fix, Agentic SOC, and Container Image Scan. |
Feature overview
Billing items
Criteria | Subscription (upfront) | Pay-as-you-go |
Billing characteristics | Pay a fixed cost monthly or yearly. This makes budget management easier. | Pay for what you use. This method is flexible and requires no upfront investment. |
Billable items | Fee = Edition fee + Value-added service fee (optional).
| Fee = Basic service fee + Feature usage fee.
|
Feature menu
Feature module | Feature overview |
Calculates an overall security score to quantify your asset security posture and identify weaknesses. Provides a dashboard for visualizing your network security status. | |
Provides a unified inventory and panoramic view of your cloud assets, containers, and servers. Collects asset fingerprints, such as accounts, ports, and processes, for fine-grained inventory and visual management. | |
Scans and analyzes the Internet exposure risks of your assets. Provides vulnerability detection and management for systems, applications, and Web-CMS. Performs baseline compliance checks and sends risk alerts based on classified protection standards and best practices. | |
Monitors and alerts you to various security threats in real time. These threats include process anomalies, web shells, malware, unusual logons, and abnormal network connections. Supports attack tracing, threat analysis, and event handling to improve response efficiency. | |
Collects and analyzes security logs and alerts from multicloud and multi-account environments. Uses built-in detection rules and AI models to automatically discover threats. Uses automated response playbooks for quick handling. | |
Integrates an anti-virus engine and malicious behavior defense rules to harden hosts. Features include brute-force attack protection and core file monitoring. Provides advanced protection such as anti-ransomware and web tamper proofing. | |
Provides active defense for container runtimes. This includes blocking risky images, preventing container escapes, and protecting against file tampering. Secures container clusters with policies such as network microsegmentation and image signing. | |
Uses runtime application self-protection (RASP) technology to detect and block attacks from within your applications. This provides built-in, active security for your business applications. | |
Provides configuration options for Task Hub, Security Report, client management, access control, alert notifications, and multi-account management. Supports global custom settings for security policies and O&M. |
Detailed features
Overview
Security Score
Feature description: This feature provides a comprehensive security assessment using data from dual global data centers (China and Global). It generates a health score on a 0–100 point scale by dynamically deducting points based on the real-time security status of your cloud assets, such as alerting events and configuration bugs. A higher score indicates a stronger security posture for your assets and directly reflects existing security risks and the degree of remediation required.
Supported editions: Supported by default. No edition limits apply.
Assets
Asset Overview
Feature description: Provides a panoramic view of your cloud assets, network topology, security score, and asset security risks, offering a unified entry point for managing the security of your cloud assets.
Supported editions:
Billing model
Support details
Subscription
Enterprise, Ultimate
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the server protection level to Host Protection or Hosts and Container Protection.
Container Asset Overview
Feature description: The Container Asset Overview feature provides visualized security management and a network topology of your cloud container assets, covering clusters, containers, images, and applications to help you manage container asset security more efficiently.
Supported editions:
Billing model
Support details
Subscription
Only Ultimate is supported.
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the protection level for your server to Hosts and Container Protection.
Server List
Feature description: Provides security status information for all your servers, including protection status, group, region, and virtual private cloud (VPC) statistics.
Supported editions: Supported by default. No edition limits apply.
Asset Fingerprint Investigation
Feature description: Collects the following fingerprint data:
Account: Collects server account and permission information, enabling you to inventory privileged accounts and detect privilege escalation.
Port: Collects and displays port listener information, helping you inventory open ports.
Process: Collects and displays process snapshots, helping you inventory legitimate processes and detect abnormal ones.
Middleware: Collects middleware information to help you understand the middleware that exists on your assets.
Database: Collects database information, helping you understand the databases present on your assets.
Web Service: Collects web service information, helping you understand the web services present on your assets.
Software: Inventories installed software, enabling you to quickly locate affected assets when a high-risk vulnerability is discovered.
Scheduled Task: Collects scheduled task information, helping you promptly inventory task paths on your assets.
Startup Item: Collects startup item information, enabling you to quickly locate corresponding startup items when handling vulnerabilities.
Kernel Module: Collects kernel module information, enabling you to quickly locate the corresponding kernel modules when handling vulnerabilities.
Website: Collects website information from your servers to help you understand the details of the websites on your assets.
IDC Probe Finding: If you configure an IDC probe on an IDC server, this feature displays information about other IDC servers detected within the IDC data center, helping you understand basic information about the servers in your IDC.
Supported editions:
Billing model
Support details
Subscription
Only Enterprise and Ultimate are supported.
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the server's protection level to Host Protection or Hosts and Container Protection.
Security Check
Feature description: After you perform a one-click check, Security Center runs checks such as vulnerability detection and baseline checks on the specified servers based on your configurations.
Supported editions:
Billing model
Support details
Subscription
Only Advanced, Enterprise, and Ultimate are supported.
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the protection level assigned to your server to Host Protection or Hosts and Container Protection.
Container Assets
Feature description: Provides security status statistics and risk information for all clusters, pods, containers, and images.
Supported editions:
Billing model
Support details
Subscription
Only Ultimate is supported.
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the protection level for your server to Hosts and Container Protection.
Cloud Products
Feature description: Provides security status information for your cloud products, including information about at-risk cloud products and statistics by category, such as Server Load Balancer and ApsaraDB RDS.
Supported editions: Supported by default. No edition limits apply.
Website
Feature description: Provides security status information for all your websites, including statistics on root domain names, subdomains, and their asset risk status and alert counts.
Supported editions: Supported by default. No edition limits apply.
Serverless Assets
Description: Detects runtime security risks for instances of cloud products that use a serverless architecture on Alibaba Cloud, including assets such as Serverless App Engine (SAE) and serverless instances of Container Compute Service (ACS). It provides malicious file detection, vulnerability scanning, and compliance baseline checks.
Supported editions:
Billing model
Support details
Subscription
Not supported
Pay-as-you-go
Enable the Serverless Asset Protection pay-as-you-go feature.
Risk Governance
Asset Exposure Analysis
Feature description: Scans and analyzes your cloud resources on Alibaba Cloud, such as ECS instances, gateway assets, system components, and ports, identifying security risks and vulnerabilities that may be exposed to the Internet. This helps you promptly find and resolve issues to improve the security of your cloud resources.
Supported editions:
Billing model
Support details
Subscription
Only Enterprise and Ultimate are supported.
Pay-as-you-go
Enable the pay-as-you-go feature for Host and Container Security and set the protection level for your server to Host Protection or Hosts and Container Protection.
Vulnerability Management
Feature description: Automatically discovers, assesses, and fixes security vulnerabilities on your servers, providing automated vulnerability scanning and remediation solutions to replace traditional manual patching for large-scale server cluster security operations.
Scan methods
Vulnerability scanning supports two methods: manual scan and automatic scan (periodic).
Manual scan: Immediately assesses the vulnerability status of your servers.
Automatic scan (periodic): Sets up periodic tasks for automated and continuous vulnerability monitoring.
Vulnerability fix
Vulnerability scanning supports the following three fix methods:
One-click fix: Security Center provides a one-click fix feature in the console. This feature helps you automate vulnerability remediation without the need to log on to the server to perform manual operations.
ImportantThe one-click fix feature is not supported for Application Vulnerability or Urgent Vulnerability.
Automatic Repair: You can enable the Automatic Vulnerability Remediation, configure automatic repair tasks, and periodically fix newly discovered vulnerabilities at specified intervals.
ImportantAutomatic fix tasks depend on the one-click fix feature. If the current edition and vulnerability type do not support one-click fix, automatic fix tasks are also not supported.
Automatic fix is supported only for non-kernel Linux system vulnerabilities. Other vulnerabilities are not supported.
Manual remediation: If one-click remediation is not supported for the current version or vulnerability, or if the Vulnerability Fix feature is not enabled, you must log on to the server and manually apply the remediation recommendations provided in the vulnerability details.
Vulnerability types and solutions
Linux Software Vulnerability:
Detection method: Compares software versions against the official CVE vulnerability database using the OVAL matching engine, generating alerts for vulnerabilities in the software versions you are using.
Fix solution: Supports one-click fixes and uses automated snapshots to enable one-click rollbacks for safer vulnerability remediation.
Windows System Vulnerability:
Detection method: Syncs with the official Microsoft patch source to detect and alert you to high-risk and impactful vulnerabilities.
Fix solution: Supports one-click fixes, automatically identifies prerequisite patch packages required for a fix to resolve issues where servers cannot be patched due to missing prerequisites, and reminds you if a system restart is needed to complete the fix, improving the efficiency of Windows system vulnerability remediation.
Web-CMS Vulnerability:
Detection method: Monitors website directories, identifies common website building software, and detects vulnerabilities in the software by comparing vulnerability files.
Fix solution: Uses self-developed vulnerability patches and supports one-click fixes, remediating vulnerabilities at the source code level by replacing or modifying files.
Urgent Vulnerability:
Detection method: Provides detection for emergency vulnerabilities that suddenly appear on the network.
Fix solution: Does not support one-click fixes. You can log on to the server and fix them manually based on the provided suggestions.
Application Vulnerability:
Detection method: Provides detection for weak passwords in system services, system service vulnerabilities, and application service vulnerabilities.
Fix solution: Does not support one-click fixes. You can log on to the server and fix them manually based on the provided suggestions.
Supported editions:
Service Model
Service Edition / Protection Level
Manual Scan Scope
Periodic Automatic Scan Scope
Vulnerability Fixing Capability
Subscription
Enterprise Edition, Ultimate Edition
All
All
Supports fixing Linux, Windows, and Web-CMS vulnerabilities.
Advanced Edition
All vulnerabilities except Application Vulnerability.
All vulnerabilities except Application Vulnerability.
Supports fixing Linux and Windows vulnerabilities.
Basic Edition, Value-added Edition, Anti-virus Edition
Urgent Vulnerability only.
Linux Software Vulnerability, Windows System Vulnerability, Web-CMS Vulnerability.
ImportantTo enable One-click Fix, you must purchase the separate Vulnerability Fix value-added service. For instructions, see Purchase Vulnerability Fixing (Subscription) and Activate Vulnerability Fixing (Pay-as-you-go).
After purchase, supports fixing Linux and Windows vulnerabilities.
Pay-as-you-go
Host Protection, Host and Container Protection
All
All
Unprotected, Anti-Virus
Urgent Vulnerability only.
Linux Software Vulnerability, Windows System Vulnerability, Web-CMS Vulnerability.
Cloud Security Posture Management
Feature description: Cloud Security Posture Management (CSPM) uses automated risk checks, baseline scans, and attack path analysis to discover and manage security risks in cloud assets. This feature identifies security risks, such as cloud product configuration errors and server configuration defects, and provides remediation suggestions to resolve these configuration-based risks.
Cloud Product Configuration Risk Check: Scans the configurations of your cloud assets to identify configuration risks in multicloud environments, covering three scenarios: identity and permission management, cloud product security best practices, and compliance checks.
Baseline Risk Check: Dives deep into the host (server) operating system level, discovering and remediating issues such as weak passwords, insecure configurations, or missing important patches based on industry standards and security specifications to meet compliance requirements.
Server Baseline Check
Check description:
Scans server security configurations through a task-based model and generates alerts for items that do not meet standards.
Supports custom detection policies. You can set check items, detection cycles, and the server groups to which they apply. Custom detection scripts are not currently supported.
Supports custom weak password rules. It periodically checks your cloud product baselines for these weak passwords based on your configured baseline policies and generates an alert if a match is found.
Detection scope:
High-risk exploit
Detects risks such as unauthorized access vulnerabilities in CouchDB and Docker.
Container security
Detects risks in Docker, Kubernetes master nodes, and Kubernetes nodes.
Classified protection compliance
Checks for compliance with the security baseline requirements of MLPS Level 3, MLPS Level 2, and international general security best practices.
Best Security Practices
Checks for compliance with the security baseline requirements for Linux, Windows, Redis, and more.
Weak password
Detects weak passwords used for logging on to MongoDB, FTP, Linux, and more.
Container Baseline Check
Check description: Provides security detection and alerts for container configurations, performing risk checks for container baseline configurations on Kubernetes master and node nodes based on Alibaba Cloud container security best practices.
Detection scope:
Alibaba Cloud Standard - Docker Security Baseline Check
Performs risk investigation and provides timely warnings for Docker security audits, service configurations, and file permissions based on the Docker baseline standard from Alibaba Cloud best practices.
Alibaba Cloud Standard - Kubernetes Master Security Baseline Check
Performs baseline checks for Kubernetes master nodes based on Alibaba Cloud container security best practices.
Alibaba Cloud Standard - Kubernetes Node Security Baseline Check
Performs baseline checks for Kubernetes node nodes based on Alibaba Cloud container security best practices.
Attack Path Analysis: Analyzes attack paths and potential risks in the cloud by correlating risks such as vulnerabilities, exposed assets, and misconfigurations. It also supports posture analysis and management of cloud product configurations and potential attack paths in a unified console.
Supported editions:
Subscription
Purchase the Advanced, Enterprise, or Ultimate Edition
ImportantIf your current edition is Anti-virus or the value-added plan and you have not purchased the CSPM value-added service, you can detect and verify the free check items of Cloud service configuration check. However, risk remediation, baseline check, and attack path analysis are not supported.
Feature
Feature details
Quota consumption
Cloud service configuration check
Check items: Free check items.
NoteThe Ultimate Edition additionally supports KSMP check items.
Operations: Detection and verification are supported. Remediation is not supported.
Does not consume Quota.
Baseline check
Check items:
Advanced Edition: Supports only weak password check items.
Enterprise Edition: Supports all check items except those for container security.
Ultimate Edition: Supports all check items.
Operations: Scanning, verification, and remediation are supported.
Included in the edition fee; does not consume Quota.
Attack path analysis
Not supported
N/A
Purchase the CSPM value-added service
ImportantIf you purchase a service edition at the same time, feature support is as follows:
For Advanced, Enterprise, or Ultimate Edition: Your current edition determines the supported check items and operations for Baseline check (see the description of Advanced, Enterprise, or Ultimate Editions). Cloud service configuration check and Attack path analysis are not affected by the edition and are detailed in the table below.
For Anti-virus Edition and value-added plan: Baseline check, Cloud service configuration check, and Attack path analysis are not affected by the edition and are detailed in the table below.
Feature
Feature details
Quota consumption
Cloud service configuration check
Check items: All check items (free + paid).
Operations: Detection, verification, and remediation are supported.
Free check items: Successful remediation consumes Quota.
Paid check items: Scanning, verification, or successful remediation consumes Quota.
Baseline check
Check items: All check items.
Operations: Detection, verification, and remediation are supported.
Scanning, verification, or successful remediation consumes Quota.
Attack path analysis
Supported
This feature is included with the paid CSPM service and does not consume Quota.
Pay-as-you-go
You must enable the pay-as-you-go feature for CSPM.
ImportantIf you purchase only the pay-as-you-go Host and Container Security feature, the service supports free check items to detect and validate Cloud Service Configuration Risk, but does not support the Risk Remediation, System Baseline Risks, or Attack Path features.
Feature
Feature details
Quota consumption
Cloud service configuration check
Check items: All check items (free + paid).
Operations: Detection, verification, and remediation are supported.
Free check items: Successful remediation consumes Quota.
Paid check items: Scanning, verification, or successful remediation consumes Quota.
Baseline check
Check items: All check items.
Operations: Detection, verification, and remediation are supported.
Scanning, verification, or successful remediation consumes Quota.
Attack path analysis
Supported
This feature is included with the paid CSPM service and does not consume Quota.
AccessKey Leak Detection
Feature description: Monitors the code hosting site GitHub in real time to capture and determine whether any publicly available source code contains AccessKey information for your Alibaba Cloud account.
Supported editions: Supported by default. No edition limits apply.
Cloud Honeypot
Feature description: Provides an out-of-the-box solution to build active defense capabilities on and off the cloud. Deploy honeypots on key attack paths to lure attackers and divert their targets. Attackers interact with realistically simulated applications and receive fake data, prolonging the attack time, recording complete attack behavior for source tracing, capturing advanced unknown attacks, and even enabling countermeasures. This gives security operators and defenders a proactive defense advantage.
Supported editions:
Billing model
Support details
Subscription
Purchase the Cloud Honeypot value-added service
Pay-as-you-go
Not supported.
Malicious File Detection
Feature description:
File Detection SDK: Leverages the Security Center multi-engine detection platform to provide a simple and easy-to-use malicious file detection service. You only need to write a small amount of code to identify malicious files using the SDK.
OSS File Detection: Leverages cloud-native advantages to support the detection of files in Alibaba Cloud Object Storage Service (OSS) buckets and accurately identify malicious files.
Malicious File Handling: When a risk file, such as a web shell, mining program, or Trojan virus, is detected in an ECS instance or OSS bucket, an alert is generated. The Malicious File Detection SDK provides methods such as Add to Whitelist, Ignore, and Block Access to handle detected malicious files.
Supported editions:
Billing model
Support details
Subscription
Purchase the Malicious File Detection value-added service.
Pay-as-you-go
You must enable the pay-as-you-go feature for Malicious File Detection.
Log Analysis
Feature description: Provides a unified query and analysis entry point by centrally storing and managing security-related logs, helping you quickly locate issues and meet compliance audit requirements.
Host logs: Records logs such as logon activity, process startups, account snapshots, and DNS requests, helping you monitor user activity, system events, and application operations on your hosts to discover potential threats and optimize performance.
Security logs: Records security logs for vulnerabilities, baselines, security alerts, and cloud security posture management, helping you observe security trends, improve security policies and defense mechanisms, and identify system weaknesses.
Supported editions:
Billing model
Support details
Subscription
Anti-virus, Advanced, Enterprise, and Ultimate: You must also purchase the Log Analysis value-added service.
NoteFor information about the specific log types supported by different editions, see Log types and field descriptions.
Pay-as-you-go
Enable the pay-as-you-go service for Log Management.
NoteLog Analysis feature has been integrated into Log Management. For more information, see Migration guide from Log Analysis to Log Management and Log Management.
Detection and Response
When you enable the Agentic SOC service, the Detection and Response feature menu is moved under Agentic SOC.
Security Alerts
Feature description:
CWPP (Cloud Workload) Security Alerts:
Detects security alerts for hosts, containers, and cloud products in real time. The detection scope covers activities related to processes, files, and networks on hosts and containers. Using threat detection models, it provides detection capabilities for issues including, but not limited to, abnormal process behavior, web shells, malware, vulnerability exploits, and container escapes, helping you promptly discover security threats in your assets and understand your security posture in real time.
In addition to various detection models, the precise defense model also provides defense and interception capabilities for high-risk attacks such as ransomware, reverse shells, malicious command execution, loading of high-risk drivers, and planting of malicious files.
It also provides methods for threat removal (such as Virus Detection and Removal, Deep Cleanup, and Quarantine) and alert suppression (such as Add to Whitelist and Ignore) to promptly handle security threats.
Network Defense Alert (formerly Attack Analysis): If you enable the Network Threat Prevention rules in Host Rules - Malicious Behavior Defense and the Host Rules - Brute-force Attacks Protection policy, Security Center provides defense and interception for high-risk network attacks such as malicious DNS requests, web shell uploads, adaptive web attack defense, and brute-force attacks. The Network Defense Alert page displays more information about the intercepted network attacks.
Supported editions:
Subscription
Service Edition
Detection scope
Alert handling capabilities
Basic and Value-added Plan
Common simple attacks in the cloud, including traditional one-line web shells, logons from unusual locations, self-mutating Trojans, DDoS Trojans, and mining programs (does not include container assets).
Alert suppression: Add to Whitelist, Ignore, etc.
Anti-virus
Basic capabilities + detection and precise defense models for suspicious and malicious files (including binaries) (does not include container assets)
Threat removal: Virus Detection and Removal, Deep Cleanup, Quarantine, etc.
Alert suppression: Add to Whitelist, Ignore, etc.
Advanced
Capabilities of Anti-virus + detection and precise defense models for suspicious and malicious process activities and file operations (does not include container assets).
Enterprise
Advanced capabilities + over 380 detection and precise defense models for all malicious behaviors such as process activities, file operations, and network connections (does not include container assets).
Ultimate
Enterprise capabilities (covering container assets) + detection and active defense models for container-specific attack behaviors such as container escapes, running of risky images, and startup of non-image programs.
Pay-as-you-go
Protection level
Detection scope
Alert handling capabilities
Unprotected
Common simple attacks in the cloud, including traditional one-line web shells, logons from unusual locations, self-mutating Trojans, DDoS Trojans, and mining programs (does not include container assets).
Alert suppression: Add to Whitelist, Ignore, etc.
Antivirus
Capabilities of the Unprotected level + detection and precise defense models for suspicious and malicious files (including binaries) (does not include container assets)
Threat removal: Virus Detection and Removal, Deep Cleanup, Quarantine, etc.
Alert suppression: Add to Whitelist, Ignore, etc.
Host Protection
Antivirus level capabilities + over 380 detection and precise defense models for all malicious behaviors such as process activities, file operations, and network connectivity (does not include container assets).
Hosts and Container Protection
Host Protection (covering container assets) capabilities + detection and active defense models for container-specific attack behaviors such as container escapes, running of risky images, and startup of non-image programs.
Security Event Handling
Feature description:
Security Center uses graph computing technology to aggregate related CWPP alerts (such as those with the same MD5 hash or parent process ID) into events. You can assess the impact of an event, perform handling actions to contain the threat, and harden the system to prevent similar events from recurring.
Handling methods: Use Recommended Handling Policy, Add to Whitelist, Update Incident Status, Run Playbook.
Supported editions: Supported by default. No edition limits apply. However, different editions support different types of alert data that can be aggregated into events.
Log Management
Feature description: Lets you store and view Security Center logs, such as vulnerability logs, security alert logs, and client event logs, helping you accurately locate alerts, trace attack sources, and improve response speed.
Supported editions:
Billing model
Support details
Subscription
Purchase Threat Analysis value-added service's Log Storage Capacity.
ImportantIf you only purchase log ingestion traffic, you cannot store and query Security Center logs.
Pay-as-you-go
Enable the pay-as-you-go service for Log Management.
Threat Analysis
When you enable the Agentic SOC service, services that are related to Detection and Response are moved to the Agentic SOC service. You can also ingest logs from third-party cloud products (such as Tencent Cloud and Huawei Cloud) and on-premises data centers.
Feature description:
Product Integration: Provides a unified log ingestion center to help you centrally collect, standardize, and analyze log data from third-party clouds (such as Fortinet, Chaitin, Microsoft, Sangfor, Tencent Cloud, Huawei Cloud, Hillstone, and Dosin) and on-premises data centers.
Rule Management: Performs in-depth detection and analysis of ingested alerts and logs to reconstruct threat attack chains and timelines, generating fused alerts and detailed security events. It also supports custom detection rules to build a threat detection system tailored to your business.
Analyzes and processes logs ingested into Agentic SOC to generate alerts and events.
The CWPP Security Alerts feature is moved into the Agentic SOC Security Alerts feature.
Uses predefined or custom Agentic SOC detection rules to analyze the context of multiple security alerts and aggregate them into complete events, reconstructing the attack chain and extracting malicious entities to help you quickly respond to and handle security risks in the cloud.
The feature for aggregating CWPP alerts (such as those with the same MD5 hash or parent process ID) into security events is moved into Agentic SOC Security Event Handling.
Handling methods include Use Recommended Handling Policy, Update Incident Status, Run Playbook, Add to Whitelist, and automatic handling of security incidents (Response Orchestration).
Response Orchestration: Security Orchestration, Automation, and Response (SOAR) is a comprehensive security solution that orchestrates and connects different systems or services according to a defined logic to achieve automated operations for security alerts and events, strengthening enterprise security defense and improving the efficiency of security event response.
Standardized logs: Store standardized alert logs generated by custom rules and standardized logs generated during Real-time Consumption through the standardized ingestion policy.
Security Center logs: The Log Management feature from Detection and Response is moved into the Agentic SOC Log Management feature.
Supported editions:
Billing model
Support details
Subscription
Purchase the Threat Analysis value-added service.
ImportantTo support Security Center logs, you must purchase Threat Analysis Log Storage Capacity.
Pay-as-you-go
Enable the pay-as-you-go service for Threat Analysis.
Host Protection
Virus Scan
Feature description: The Security Center security expert team has launched the Alibaba Cloud machine learning virus scan engine through automated analysis of massive virus samples, persistence methods, and attack techniques, enabling one-click virus scanning.
Supported editions:
Billing model
Support details
Subscription
Anti-virus, Advanced, Enterprise, and Ultimate
Pay-as-you-go
You must have enabled the pay-as-you-go service for Host and Container Security, and the server's protection level must be Antivirus, Host Protection, or Host and Container Protection.
Host Rule Management
Feature description:
Malicious Behavior Defense: Supports built-in and custom malicious behavior defense rules to harden server system security.
Defense Against Brute-force Attacks: Set a brute-force attack protection policy to prevent brute-force cracking of host resource account passwords.
Common Logon Management: Set common logon locations, common logon IP addresses, common logon times, and common logon accounts to generate alerts for logons from outside the specified scope.
Supported editions:
Service model
Feature support details
Subscription
Anti-virus
Only supports adding process hashes to the whitelist using custom rules in Malicious Behavior Defense.
Only supports Common Logon Management in Common Logon Location management.
Advanced
Only supports Malicious Behavior Defense in System Defense Rule Process Protection. Network defense is not supported.
Supports all features of Defense Against Brute-force Attacks and Common Logon Management.
Enterprise and Ultimate
Supports all features of Malicious Behavior Defense, Defense Against Brute-force Attacks, and Common Logon Management.
Pay-as-you-go
You have enabled the pay-as-you-go service for Host and Container Security and bound a protection level to the server.
Antivirus
Supports adding process hashes to the whitelist using custom rules in Malicious Behavior Defense.
You can use Common Logon Management to manage your Common Logon Location.
Host Protection and Host and Container Protection: All features
Supports all features of Malicious Behavior Defense, Defense Against Brute-force Attacks, and Common Logon Management.
Core File Monitoring
Feature description: Provides real-time monitoring and alerting for operations such as accessing, modifying, deleting, and renaming files, reducing the risk of core files being stolen or tampered with.
Supported editions:
Billing model
Support details
Subscription
Enterprise and Ultimate
Pay-as-you-go
You must have enabled the pay-as-you-go service for Host and Container Security, and the server's protection level must be Host Protection or Host and Container Protection.
Agentless Detection
Feature description: Uses agentless technology to scan and discover security risks such as ECS vulnerabilities, malicious files, and baseline configuration issues without installing a client.
Supported editions:
Billing model
Support details
Subscription
Not supported
Pay-as-you-go
Enable the pay-as-you-go feature for Agentless Detection in Host Protection.
Anti-ransomware
Feature description: Supports backup and recovery of server and database files to mitigate the impact of ransomware attacks on servers and databases.
Supported editions:
Billing model
Support details
Subscription
Purchase the Anti-ransomware value-added service.
Pay-as-you-go
Enable the Host Protection Anti-ransomware pay-as-you-go feature.
Web Tamper Proofing
Feature description: Provides real-time monitoring of website directories and restores tampered files or directories from backups, ensuring that important system website information is not maliciously altered and preventing the injection of Trojans, black links, or illegal content such as terrorist threats or pornography.
Supported editions:
Billing model
Support details
Subscription
Purchase the Web Tamper Proofing value-added service.
Pay-as-you-go
Enable the pay-as-you-go feature for Web Tamper Proofing.
Container Protection
Active Container Defense
Feature description:
Risk Image Blocking
This feature checks images for security risks and performs actions such as intercept, alert, or allow on images that match active container defense rules, ensuring that images started in the cluster meet your security requirements.
Non-image Program Defense
This feature detects and intercepts the startup of programs that are not part of the image while the container is running, actively defending against malware intrusion.
Container Escape Prevention
This feature detects high-risk behaviors from multiple dimensions such as processes, files, and system calls, establishing a protective barrier between the container and the host to effectively block escape behaviors and ensure container runtime security.
Supported editions:
Billing model
Support details
Subscription
Ultimate
Pay-as-you-go
Enable the pay-as-you-go service for Host and Container Security, and set the server's protection level to Host and Container Protection.
Container File Protection
Feature description: The Container File Protection feature monitors directories or files within a container in real time, generating alerts or intercepting tampering behavior when a directory or file is maliciously altered to prevent the injection of illegal information or malicious code files into the application.
Supported editions:
Billing model
Support details
Subscription
Ultimate
Pay-as-you-go
Enable the pay-as-you-go service for Host and Container Security, and set the server's protection level to Host and Container Protection.
Container Firewall
Feature description: Container Firewall is a firewall service provided by Security Center for container environments. When a hacker exploits a vulnerability or a malicious image to intrude into a container cluster, Container Firewall generates an alert or intercepts the abnormal behavior.
Supported editions:
Billing model
Support details
Subscription
Ultimate
Pay-as-you-go
You have activated the pay-as-you-go service for Host and Container Security, and the server's protection level is set to Host and Container Protection.
Container Image Signing
Feature description: Supports trusted signing of container images to ensure that only approved container images are deployed, preventing the startup of unauthorized, unsigned images and helping improve asset security.
NoteCurrently, only Kubernetes clusters deployed in the China (Hong Kong) region support container image signing.
Supported editions:
Billing model
Support details
Subscription
Ultimate
Pay-as-you-go
Enable the pay-as-you-go service for Host and Container Security, and set the server's protection level to Host and Container Protection.
Image Security Scan
Feature description: This feature provides trusted signing for container images. This ensures that only approved container images are deployed, prevents unsigned or unauthorized images from starting, and improves the security of your assets.
NoteContainer image signing is currently available only for Kubernetes clusters in the China (Hong Kong) region.
Supported editions:
Billing model
Support details
Subscription
Purchase the Container Image Scan value-added service.
ImportantWhen purchasing, you can only buy the Advanced, Enterprise, Ultimate, or Value-added Plan, to purchase the Container Image Scan value-added service.
Pay-as-you-go
Not supported.
CI/CD Integration Settings
Feature description: Supports detecting and identifying high-risk system vulnerabilities, application vulnerabilities, malicious viruses, web shells, malicious execution scripts, configuration risks, and sensitive data in images during the project build phase in Jenkins or GitHub, and provides vulnerability fix suggestions.
Supported editions:
Billing model
Support details
Subscription
Purchase the Container Image Scan value-added service.
ImportantWhen purchasing, you can only purchase the Container Image Scan value-added service if you select the Advanced, Enterprise, Ultimate, or Value-added Plan edition.
Pay-as-you-go
Not supported.
Application Protection
Feature description: Based on Runtime Application Self-Protection (RASP) technology, it provides security defense for applications by detecting attacks at runtime and generating alerts or blocking them. For more information, see What is Application Protection?.
Supported editions:
Billing model
Support details
Subscription
Purchase the Application Protection value-added service.
Pay-as-you-go
Enable the pay-as-you-go service for Application Protection.
System Settings
Task Hub
Feature description: Provides task management features. By executing tasks, you can automatically and batch-fix vulnerabilities on multiple servers.
Supported editions:
Billing model
Support details
Subscription
Enterprise, Ultimate
Pay-as-you-go
Enable pay-as-you-go for Vulnerability Fixing.
Security Report
Feature description: Customize the security data you want to follow and have it sent periodically to the mailboxes of relevant security support personnel, enabling more effective real-time monitoring of your assets' security status.
Supported editions:
Billing model
Support details
Subscription
Advanced, Enterprise, and Ultimate
Pay-as-you-go
Enable any pay-as-you-go service.
Feature Settings - Settings - Host Protection Settings
Feature description:
Proactive Defense
Feature name
Feature overview
Malicious Host Behavior Prevention
Helps you automatically intercept and kill common network viruses, including mainstream ransomware, DDoS Trojans, mining programs, Trojans, malicious programs, backdoors, and worms.
Anti-ransomware (Bait Capture)
Provides a honeypot to capture new types of ransomware and automatically initiates defense against them through virus behavior analysis.
Webshell Prevention
Helps you automatically intercept abnormal connection behaviors from hackers through known web shells. You can also view alerts and quarantine samples in Security Alerts, and view quarantined samples in the quarantine box.
User Experience Optimization in Proactive Defense
If a server shuts down abnormally or its security defense capabilities are missing, Security Center will collect the server's Kdump data for security protection analysis to continuously improve the security defense experience of Security Center.
Webshell Detection and Removal: Periodically detects web shells and Trojan programs in website servers and web page directories.
Adaptive Threat Detection Capability: After you enable adaptive threat detection, if a high-risk intrusion event occurs on a server, Security Center automatically enables strict alert mode for the server's client to detect hacker intrusions more quickly.
Alert Settings: Provides different alert modes for server alerts to meet your security needs in different application scenarios.
Balanced Mode: Alibaba Cloud aims to minimize false positives while detecting more potential risks.
NoteSecurity Center enables Balanced Mode by default for all connected servers.
Strict Mode: Provides a wider range of suspicious behavior alerts but comes with a higher risk of false positives. It is suitable for use during major events. Enable with caution.
Supported editions:
Service model
Feature support details
Subscription
Anti-virus:
Proactive Defense: Malicious Host Behavior Prevention, Anti-ransomware (Bait Capture)
Webshell Detection and Removal
Alert Settings
Advanced:
Proactive Defense: Malicious Host Behavior Prevention, Anti-ransomware (Bait Capture), Webshell Prevention
Webshell Detection and Removal
Alert Settings
Enterprise and Ultimate: All features.
Pay-as-you-go
You have enabled the pay-as-you-go service for Host and Container Security and bound a protection level to the server.
Antivirus:
Proactive Defense: Malicious Host Behavior Prevention, Anti-ransomware (Bait Capture)
Webshell Detection and Removal
Alert Settings
Host Protection and Host and Container Protection: All features.
Feature Settings - Settings - Container Protection Settings
Feature description:
Threat Detection on Kubernetes Containers: Detects the security status of running container clusters in real time to help you promptly discover security risks and hacker intrusions in your container clusters. The following check items are supported:
Abnormal command execution in K8s API Server
Abnormal directory mounting in pods
Lateral movement using K8s Service Account
Startup of pods with malicious images
Container Escape Prevention: Detects high-risk behaviors from multiple dimensions such as processes, files, and system calls, establishing a protective barrier between the container and the host to effectively block escape behaviors and ensure container runtime security.
Supported editions:
Service model
Feature support details
Subscription
Ultimate
Pay-as-you-go
You have enabled the pay-as-you-go service for Host and Container Security, and the protection level of the server is Host and Container Protection.
Feature Settings - Settings - Client Capability Configuration
Feature description:
Agent Protection: After you enable agent protection, Security Center actively intercepts attempts to uninstall the agent without using the Security Center console, preventing attackers from directly intruding into the server to maliciously uninstall the agent or other programs from mistakenly closing the agent process.
Client Resource Management: Supports manually adjusting the client's running mode to limit its resource consumption, meeting server protection requirements in multiple business scenarios and achieving better security protection effectiveness. It includes Low Consumption Mode, Smooth Mode, and Custom Mode.
Local File Detection Engine: The local file detection engine performs security checks on newly created script files and binary files on servers, reporting alerts when security threats are detected.
In-depth Detection Engine: The deep detection engine helps you discover more in-depth security risks, such as rootkit detection, tunneling, and backdoor detection.
Supported editions:
Service model
Feature support details
Subscription
Anti-virus, Advanced: support only Agent Protection and Client Resource Management (Low Consumption Mode, Smooth Mode).
Enterprise and Ultimate: All features.
Pay-as-you-go
You have enabled the pay-as-you-go service for Host and Container Security and bound a protection level to the server.
Antivirus: Only supports Agent Protection and Client Resource Management (Low Consumption Mode, Smooth Mode).
Host Protection, Host and Container Protection: All features.
Feature Settings - Settings - Other Configurations
Feature description:
Data Delivery of ActionTrail: Uses the service-linked role of Security Center to ship ActionTrail data to the logStore of Security Center. You can use this data for threat detection and alert analysis, such as abnormal AccessKey calls, unusual RAM account logons, and execution of high-risk commands.
Global Log Filter: To reduce your log storage costs while maintaining security effectiveness, client logs are deduplicated and filtered before being reported, improving the efficiency of log-based security operations.
Supported editions:
Billing model
Support details
Subscription
Anti-virus, Advanced, Enterprise, and Ultimate: You must also purchase the Log Analysis value-added service.
All editions support Data Delivery of ActionTrail by default.
After purchasing the Log Analysis value-added service, you can use the Global Log Filter.
NoteFor information about the specific log types supported by different editions, see Log types and field descriptions.
Pay-as-you-go
Enabling any feature supports Data Delivery of ActionTrail.
Service model
Feature support details
Subscription
Pay-as-you-go
Enable the pay-as-you-go service for Host and Container Security and bind a protection level to the server.
Antivirus: Only supports Agent Protection, Client Resource Management.
Host Protection and Host and Container Protection: All features.
Feature Settings - Client
Feature description: Lets you centrally view servers with unprotected clients and obtain security commands and client uninstallation options. It also provides support for proxy access client solutions.
Supported editions: Supported by default. No edition limits apply.
Feature Settings - Multicloud Configuration Management
Feature description:
Multicloud Asset Integration: Supports integrating non-Alibaba Cloud servers (including third-party cloud servers and IDC servers) into Security Center for protection and management.
Integrate IDC Assets: By creating an IDC probe, you can detect and discover IDC server assets and synchronize the discovered IDC servers to the Asset Center module of Security Center for unified management.
Asset Management Rules: By setting conditions for different asset management rules, you can group or tag servers that meet the same conditions, helping you improve asset management efficiency.
Supported editions: Supported by default. No edition limits apply.
Notification Settings
Feature description: Configure alert policies for various security events such as security alerts, vulnerability intelligence, and baseline risks. Receive notifications through the following methods.
Email/Internal Message
DingTalk Chatbot
Cloud Monitor Push
Supported editions:
Service model
Feature support details
Subscription
Anti-virus: Email/Internal Message, Cloud Monitor Push
Advanced, Enterprise, and Ultimate: All features.
Pay-as-you-go
Enable any pay-as-you-go service.
Multi-account Security Management
Feature description: Supports unified management of asset security across multiple member accounts within your enterprise, helping you promptly obtain security risk information for all member accounts in your enterprise.
Supported editions: Supported by default. No edition limits apply.
Compliance Check
Feature description:
Security Compliance Check: Provides classified protection compliance checks covering communication networks, regional boundaries, computing environments, and Management Hub, and provides Classified Protection Compliance Check reports.
ISO 27001 Compliance Check: Checks whether your system meets the requirements of ISO 27001 certification, such as asset management, access control, cryptography, and operational security, helping you pass ISO 27001 certification.
Supported editions: Supported by default. No edition limits apply.