Skip to content

Docker: Secure Software Supply Chain, Part Two

Published on

In this module, we describe the various security threats that exist against Docker, Explore how threats could be used to compromise Docker hosts, including network sniffer, malicious payload inserted into a build in the pipeline, a vulnerable third-party package in an image, poisoning od an image in the registry, stealing secrets, and resources and resources starvation, and share the reasoning behind why you must harden Docker containers and container infrastructure.