Any secure solution involves multiple lines of defense. Should you secure your images before you push, after you push, before you deploy, after you deploy? Should your registry be secured within a VNET and should your images be signed? The answer is yes.
In this deck, Steve Lasker will review multiple scanning options, the container quarantine pattern for creating secure by default registries, image signing and VNET & Firewall rules. We'll cover securing production nodes, and how to handle new vulnerabilities that may impact images already deployed.