-
Notifications
You must be signed in to change notification settings - Fork 10.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feedback before writing: Scan docker images for vulnerabilities #698
Comments
This is definitely a good recommendation, but there are different approaches on how to solve this:
The benefit of the last one is that you can implement and replace without touching the source code. And that you can use several tools at the same time. The downside is that is not part of the build itself, you need to set a specific task as part of the build/deploy process. Be aware that there are some tools that allow you to reduce Docker images like distroless. As this tools remove all that is non essential, they will destroy every shred of possible usable information to detect a CVE. |
@gonrial You just made this bullet much better, I'm updating the TOC. My thoughts:
Question - Any features we want to emphasize besides OS-level CVE, code CVE, secrets leak? Are you familiar with some famous OS-level CVE? Thoughts? p.s. If you want to right this bullet, be my guest...:) |
Closing as the matching PR is merged #718 |
Context: This is used to share my TOC of a new best practice so I can solicit feedback and ideas before start writing. From my experience, this makes the writing experience much easier and shorter. And fun.
Title: Scan all docker image layers for vulnerabilities
https://www.jenkins.io/images/post-images/2018-06-15-anchore/report.png
Thoughts? improvement? Help me to make it better
The text was updated successfully, but these errors were encountered: