This document summarizes best practices for container security. It begins with case studies and hygiene factors like fully patching images and scanning images before pushing them to a registry. It then discusses DevSecOps practices like architectural reviews, automation, and training. Recommendations are provided for tools to address image vulnerability scanning, source code scanning, run-time security, compliance, and comprehensive security. Finally, it discusses platform-specific considerations for AWS, Azure, DockerHub and others regarding registry access control, vulnerability scanning, and run-time protection tools.
2. One of the main cyber-risks is to think they dont
exist. The other is to try to treat all potential risks.
It takes 20 years to build a reputation and few
minutes of cyber-incident to ruin it.
-Stephane Nappo, CISO