Featured image

Customizing Docker Hardened Images

In Part 1 and Part 2, we established the baseline.You migrated a service to a Docker Hardened Image (DHI), witnessed the vulnerability count drop to zero, and verified the cryptographic signatures and SLSA provenance that make DHI a compliant foundation. But no matter how secure a base image is, it is useless if you can’t run your application on it.This brings us to the most common question engineers ask during a DHI

Just published by Docker: Read more