Container Security and Image Scanning
The $50,000 AWS Bill: When Cryptominers Hijack Your Containers
What You'll Learn
The Container Security Threat Model
Image Scanning with Trivy
Basic Trivy Scanning
Advanced Trivy Configuration
Trivy in Pre-commit Hooks
Building Secure Base Images
The Base Image Comparison
Multi-Stage Build for Security
Security-Hardened Dockerfile Best Practices
Container Runtime Security
Kubernetes Security Contexts
Pod Security Standards
Network Policies
Admission Controllers
OPA Gatekeeper Policies
Kyverno Policy
Continuous Image Scanning in Registry
Harbor Registry with Trivy
Runtime Threat Detection
Falco for Runtime Security
Best Practices
1. Minimize Base Images
2. Scan Everything, Everywhere
3. Never Run as Root
4. Use Read-Only Filesystems
5. Set Resource Limits
Key Takeaways
What's Next
Last updated