Summary

Summary, next steps, and additional resources

By

Matt Colman

Summary

This learning path described what container images are and the threat vectors that need to be secured in a containerized system. It then set out the best practices for ensuring that container images are created with security in mind, and wrapped up with a hands-on tutorial showing you how to scan a Dockerfile and take remedial action to reduce vulnerabilities.

The learning path covered:

  • Containerized system threat vectors
  • Container image security best practices
  • A vulnerability scanning and remediation use case

Next steps

Why not try creating your own Dockerfile and container image? Start with an old image from Docker Hub and see what changes you can make to reduce the vulnerability count and ensure that your Dockerfile doesn’t have any configuration flaws. You can use node:12.22.11 as the base image. Good luck!