Useful Links
Computer Science
Cybersecurity
Container Security
1. Introduction to Container Security
2. Securing the Build Phase
3. Securing the Ship Phase
4. Securing the Run Phase
5. Advanced Security Topics
Securing the Ship Phase
Container Registry Security
Registry Access Control
Authentication Mechanisms
Username/Password Authentication
Token-based Authentication
Certificate-based Authentication
Integration with Identity Providers
Authorization Models
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Fine-grained Permissions
Resource-level Access Control
Registry Vulnerability Management
Automated Image Scanning
Continuous Vulnerability Monitoring
Vulnerability Reporting
Remediation Workflows
Registry Organization and Management
Namespace Management
Repository Structure
Tagging Strategies
Retention Policies
Cleanup Automation
Registry High Availability and Security
Registry Replication
Backup and Recovery
Disaster Recovery Planning
Security Monitoring
Image Integrity and Provenance
Image Signing Fundamentals
Digital Signature Concepts
Public Key Infrastructure (PKI)
Certificate Management
Signing Workflows
Image Verification
Signature Verification Process
Policy Enforcement
Verification at Runtime
Failed Verification Handling
Signing Tools and Technologies
Docker Content Trust
Notary Architecture
Trust Pinning
Delegation and Roles
Key Management
Sigstore Ecosystem
Cosign for Container Signing
Keyless Signing with OIDC
Transparency Log Integration
Rekor for Artifact Transparency
Other Signing Solutions
GPG-based Signing
Custom Signing Solutions
Supply Chain Attestation
Build Provenance
SLSA Framework
In-toto Attestations
Provenance Verification
CI/CD Pipeline Security
Security Gate Implementation
Vulnerability Threshold Policies
Quality Gate Configuration
Automated Policy Enforcement
Exception Handling Procedures
Pipeline Credential Management
Secret Storage Solutions
Credential Rotation
Least Privilege Access
Service Account Management
Pipeline Security Monitoring
Activity Logging
Anomaly Detection
Unauthorized Change Detection
Compliance Reporting
Secure Pipeline Design
Pipeline Isolation
Build Environment Security
Artifact Integrity
Deployment Security
Previous
2. Securing the Build Phase
Go to top
Next
4. Securing the Run Phase