Updated on 2025-04-23 GMT+08:00

SWR Security Best Practices

Security is a shared responsibility between Huawei Cloud and you. Huawei Cloud ensures the security of cloud services. As a tenant, you should take advantage of the security capabilities provided by Huawei Cloud to protect your data and use the cloud securely. For details, see Shared Responsibilities.

This document provides guidance for enhancing the overall security of SoftWare Repository for Container (SWR). You can continuously evaluate the security of your SWR resources and enhance their overall defensive capabilities by combining different security capabilities provided by SWR. By doing this, images stored in SWR can be protected from leakage and tampering both at rest and in transit.

Consider the following aspects for your security configurations:

Scanning Images to Detect Container Image Vulnerabilities and Security Risks in Advance

You are advised to scan images stored in SWR periodically. You can scan system vulnerabilities, application vulnerabilities, malicious files, software information, file information, baseline configurations, weak passwords, sensitive information, software compliance, and basic image information to identify and fix potential risks. This ensures that all images deployed in the production environment have passed strict security checks, ensuring that the system and applications can run securely and stably.

Strengthening Permissions Management to Reduce Related Risks

  1. Do not allow IAM users to access SWR using administrator permissions.

    Create Huawei Cloud IAM users and grant them access permissions on different container images to isolate permissions between employees.

  2. Access SWR through a VPC endpoint for refined control over different image organizations.

    Accessing SWR through a VPC endpoint enables refined data boundary control over SWR. You can configure the VPC endpoint and IAM policies to control the push and pull permissions in a specified VPC and allow only images in a fixed organization to be pulled in that VPC.

Enabling Image Access Audit for Post-event Backtracking

The audit function records all user operations on SWR in real time. By recording, analyzing, and reporting user access to SWR, the audit function helps you generate compliance reports and trace the root cause of an accident, improving data asset security. For details, see Viewing Logs in CTS.