Supply Chain Security - 20%

Minimize base image footprint

Secure your supply chain: whitelist allowed image registries, sign and validate images

Use static analysis of user workloads (e.g. kubernetes resources, docker files)

Scan images for known vulnerabilities

Last updated