Category: Security, Data, Docker

We think you might be interested in this job:

A couple of months ago we’ve heard about Docker and vulnerabilities found on some of their images. It’s easy to imagine what could happen if one of our applications would be running on one of those images.

But having the right tools we could forget about that kind of issue, or at least, we could have a way to detect if our image has suffered a leak or it’s exposing us to vulnerability.

It works in this way through it’s core principles, as defined by This list has different principles, some oriented to implementation (like principle 4, 6, and 7), organizational principles (like 3m 8 and 9), and “human” principles like 1 and 2.

At Teracloud we work around the clock to give exactly that to our beloved clients.