Learn how to build a secure supply chain for Docker images in this 30-minute video from Docker. Explore the importance of image provenance, vulnerability scanning, and automated security processes. Discover how Docker Trusted Registry with Image Scanning can provide insights into vulnerabilities and create an audit trail. Gain knowledge on hardware lifecycle, Docker Content Trust, and see practical demonstrations to enhance your organization's security posture while maintaining efficiency.
Overview
Syllabus
Intro
Hardware Lifecycle
Docker
Docker Content Trust
Demo
Demonstration
Recap
Taught by
Docker