As enterprises adopt containers, microservices and Kubernetes for cloud native applications, vulnerability management is crucial to improve the security posture of containerized workloads throughout build, deployment and runtime. By following best practices for image building and scanning throughout the application development and deployment process, you can help ensure the security of the containers and workloads in your environment.

Both types of images improve your security posture by reducing the attack surface and exposure to vulnerabilities.

Container image hardening adds defensive layers that allow you to run applications securely within a container, while also reducing security weaknesses and the attack surface.

(Note that both false positives and negatives are to be expected during container image scanning; your application and security teams will need to analyze these and assess risk).

Related Articles