Minimize Base Image Footprint
Best practices for securing container images
Whitelist Allowed Registries
Limit image sources to trusted registries only.
Static Analysis of User Workloads
Inspect container images for security issues.
Scan Images for Known Vulnerabilities
Detect security vulnerabilities in container images.