Supply Chain Security - 20%
Minimize base image footprint
Secure your supply chain: whitelist allowed image registries, sign and validate images
Use static analysis of user workloads (e.g. kubernetes resources, docker files)
Scan images for known vulnerabilities
PreviousMinimize Microservice Vulnerabilities - 20%NextMonitoring, Logging and Runtime Security - 20%
Last updated