Tigera: Container security basics (part 3) - Mitigate security risks during build and runtime stages

Tigera: Container security basics (part 3) - Mitigate security risks during build and runtime stages

 PT
Online

Most container security tools provide scanning capabilities to find vulnerabilities but don’t focus on the critical step of mitigating the risk of security threats that can exploit these vulnerabilities. In this final webinar on container security basics, we take a look at topics below to mitigate the risks of exploitation of vulnerabilities:

  • Prioritization of vulnerabilities to address
  • Creation of policies to minimize the risks of exploitation by threats
  • Using policies and exceptions to allow deployment of approved images