Container security basics (part 3) – Mitigate security risks during build and runtime stages

Topics:

Security
Americas
August 9, 2022
10:00 am PDT

Most container security tools provide scanning capabilities to find vulnerabilities but don’t focus on the critical step of mitigating the risk of security threats that can exploit these vulnerabilities. In this final webinar on container security basics, we take a look at topics below to mitigate the risks of exploitation of vulnerabilities:

  • Prioritization of vulnerabilities to address
  • Creation of policies to minimize the risks of exploitation by threats
  • Using policies and exceptions to allow deployment of approved images

WATCH THE REPLAY

Join our mailing list​

Get updates on blog posts, workshops, certification programs, new releases, and more!