This learning path described what container images are and the threat vectors that need to be secured in a containerized system. It then set out the best practices for ensuring that container images are created with security in mind, and wrapped up with a hands-on tutorial showing you how to scan a Dockerfile and take remedial action to reduce vulnerabilities.
The learning path covered:
Containerized system threat vectors
Container image security best practices
A vulnerability scanning and remediation use case
Next steps
Why not try creating your own Dockerfile and container image? Start with an old image from Docker Hub and see what changes you can make to reduce the vulnerability count and ensure that your Dockerfile doesn’t have any configuration flaws. You can use node:12.22.11 as the base image. Good luck!
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.