Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@ Utilize security features provided by container runtimes, such as SELinux, AppAr
- **Monitor Container Activity**
Implement logging and monitoring mechanisms to detect and respond to security incidents. Monitor container behavior, access logs, and system logs to identify any suspicious activity.

- **Secure Container Registry**
Protect container images by securing the container registry. Implement authentication, access controls, and encryption to ensure that only authorized users can access and modify container images.
- **Secure Container Registry and supply chain**
Protect container images by securing the container registry. Implement authentication, access controls, and encryption to ensure that only authorized users can access and modify container images. Thus, enforce image signing and verification (with Notary, Sigstore) and only allow deployment of signed, policy‑compliant images from approved registries into production environments

---

Expand Down