YoVDO

Container Image Security- What It Is and How to Remediate Vulnerabilities

Offered By: Mirantis via YouTube

Tags

DevOps Courses Cybersecurity Courses Trivy Courses

Course Description

Overview

Explore container image security in this comprehensive one-hour tech talk from Mirantis Labs. Learn about the critical importance of protecting containers from threats like hard-coded information, secrets, tokens, and vulnerabilities. Discover how to identify container vulnerabilities and implement essential tools for safeguarding your container environments. The talk covers container image security fundamentals, best practices, vulnerability identification, and scanning techniques. Watch a live demonstration of installing and using Trivy for vulnerability scanning, and gain insights from an extensive Q&A session addressing integration with various platforms, comparisons with other tools, and future developments in container security.

Syllabus

- Introduction & agenda
- Understanding container image security
- Image security best practices
- Security vulnerabilities: what they are & how to identify them
- Scanning for security vulnerabilities: how to do it & what tools to leverage
- Live Q&A: how can a root privilege container user gain control over the entire host?
- Live Q&A: how is Trivy different from Amazon's ECR image scanner?
- Demo: installing Trivy, running samples & generating reports
- Live Q&A: can Trivy be integrated with Azure DevOps pipelines?
- Live Q&A: how does Trivy compare to Synk?
- Live Q&A: where do we need to host Trivy to integrate with CI/CD pipelines?
- Live Q&A: is there a consolidated view for all images within a private registry?
- Live Q&A: how can we view report changes over time?
- Live Q&A: is there a way to expedite the build-time when using Trivy?
- Live Q&A: can Trivy export to a compatible SonarQube format?
- Live Q&A: is there a plan to expand Trivy's capabilities to running containers?
- A look at next week's Tech Talk


Taught by

Mirantis

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera