Vulnerability Advisor checks the security status of container images that are provided by IBM®, third parties, or added to your organization’s registry namespace. it also provides security management for IBM Cloud Container Registry, generating a security status report that includes suggested fixes and best practices.
When you add an image to a namespace, the image is automatically scanned by Vulnerability Advisor to detect security issues and potential vulnerabilities. If security issues are found, instructions are provided to help fix the reported vulnerability.
Any issues that are found by Vulnerability Advisor result in a verdict that indicates that it is not advisable to deploy this image. If you choose to deploy the image, any containers that are deployed from the image include known issues that might be used to attack or otherwise compromise the container. The verdict is adjusted based on any exemptions that you specified. This verdict can be used by Container Image Security Enforcement to prevent the deployment of nonsecure images in IBM Cloud™ Kubernetes Service.
Fixing the security and configuration issues that are reported by Vulnerability Advisor can help you to secure your IBM Cloud infrastructure.
🎓 What will you learn?
When you have completed this workshop, you will understand how to:
🔥Build a Docker image.
🔥Push Docker image to the IBM Cloud Container Registry.
🔥Check the image vulnerabilities.
👩💻 Who should attend?
All tech guys are welcome to attend the webinar!
☁ Register for a free IBM Cloud Account: https://ibm.biz/BdqNBZ
prior to the event to get the most out of our workshop.
Tal Neeman, IBM Developer Advocate
Tel Aviv, Israel