During the execution of this assessment, we check (once or periodic) the components of your Docker container(s) for known vulnerabilities. After all, an attacker who manages to gain access to your Docker container could also easily gain access to your other containers. By continuously scanning your Docker containers for vulnerabilities, you take targeted action to monitor and actively secure them.