With
this process, the developer becomes part of the security process. Devs
are able to see the results of the scanning process before they deploy
the software," said McCauley. "We've made it our goal to secure the
global software supply chain from development, test to production."Docker
image scanning and vulnerability detection provides a
container-optimized capability for granular auditing of images. The
results are presented in a bill of materials containing the details of
the image layers and components, along with the security profile of each
component, according to Docker.
Loading...
Post a Comment