This is a basic requirement to secure containers. But static scanning is not enough, you need to run/sandbox the images before pushing them to registry. With the dearth of supply chain attacks you cannot trust the image (especially from 3rd party), most security teams will not know the impact of the container till it’s deployed.
Great Video! Very easy to understand!
Wonderful video, please if possible kindly show a demo of runtime scanning oh Host vulnerabilities as well
This is a basic requirement to secure containers. But static scanning is not enough, you need to run/sandbox the images before pushing them to registry. With the dearth of supply chain attacks you cannot trust the image (especially from 3rd party), most security teams will not know the impact of the container till it’s deployed.
wonderful
Great video and I see the emergency gin hiding under the globe :)