From the course: Certified Kubernetes Security Specialist (CKS) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Scanning for vulnerable images

Scanning for vulnerable images

- Within Kubernetes, there are three primary methods that you can use for scanning images and working with scanned images. The first is command-line tools. Now we're going to talk about a number of these, but this is probably the easiest to get started with because all you have to do is load up a tool, operate on it, understand how to use the command lines and things like that. And it gives you the ability to be able to get a quick check of any images that you would download or potentially want to use. You also have the ability to leverage registry scanning tools as well. Now this is something that you can use within the platform of choice that you are going to be using for housing your images. And Docker has the capability of doing this with Docker Scout. You've got others that you can do like Quay for example, which has a a container scanning function. All of these can potentially be used and is a very viable way of ensuring that the images that are pulled are all scanned. And then…

Contents