Slide 5
Slide 5 text
October 17, 2018
October 17, 2018
• Checking the software packages, binaries,
libraries, operative system files, against one
or more well known vulnerabilities databases.
• Analyzing the Dockerfile and image
metadata to detect security sensitive
configurations
• User defined policies like software packages
blacklists, base images whitelists.
Container image scanning