From the course: Microservices Security Workshop: From Build to Production
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Container scanning
From the course: Microservices Security Workshop: From Build to Production
Container scanning
- [Instructor] Okay, I have to come clean. When I said we were done with scanners, there's actually two more kinds of scanning. The most common type of artifact used in microservice environments is the container. While containers make application delivery fast and predictable, they also introduce a ton of security considerations. One of the most common points of confusion for teams is figuring out where and how to scan containers for vulnerabilities. There are multiple scanning points: development, build, deployment, runtime. Each one of these scanning points introduces different issues. So in this lesson, we'll first break down what a container is made of and then explain what each scanning location reveals. At a basic level, a container starts with a base image. In our example microservices, we've been using the Python:3.x-slim image, which is a pared down version of Debian Slim, designed to keep container sizes manageable. This slim variant is common for microservices because it…
Contents
-
-
-
-
-
(Locked)
CI/CD security4m 2s
-
(Locked)
Securing artifact repositories (artifactories)3m 44s
-
(Locked)
Container scanning4m 4s
-
(Locked)
DAST for microservices3m 22s
-
(Locked)
Microservice backups3m 54s
-
(Locked)
Encryption and service mesh3m 30s
-
(Locked)
Red teaming and penetration testing (pentesting)3m 58s
-
(Locked)
Challenge: Run and fix a container scan59s
-
(Locked)
Solution: Run and fix a container scan3m 2s
-
(Locked)
-
-