Tigera: Container security basics (part 2) - Using Calico for vulnerability management

Tigera: Container security basics (part 2) - Using Calico for vulnerability management

 PT
Online

In this container security series, you will further learn how Calico Cloud’s image assurance capabilities reduce the attack surface by identifying vulnerabilities and misconfigurations and automatically blocking the use of vulnerable images with an admission controller. In addition, we will review how to specify exceptions to allow the use of images with vulnerabilities, visualize the security risk posed by these vulnerabilities at runtime, and author security policies to mitigate the risks. In this webinar, you will learn

  • How to scan images to find vulnerabilities and misconfigurations
  • Interpret scan results and author deployment policies and exceptions
  • Build security policies to strengthen the runtime security posture