I disagree. Analyzing the registry is a good start, but we need a more comprehensive approach. We should be doing vulnerability analysis at multiple stages - in the CI system, in the registry, and against the running containers.
I'm pretty confident on this one. If we ensure the images in the registry are secure, then the containers based on those images should be secure as well. Analyzing the registry should be enough.
Hmm, I think the key here is that containers can have unique vulnerabilities beyond just the base image. We need to analyze the running containers too, not just the registry.
I'm not sure about this one. The question seems to be asking about the scope of vulnerability analysis, but I'm not sure if just analyzing the images in the registry is sufficient.
Dalene
2 months agoRoxane
2 months agoErnest
3 months agoSheron
3 months agoApolonia
3 months agoAshley
3 months agoKanisha
4 months agoNakisha
4 months agoCeola
4 months agoTalia
4 months agoAlton
4 months agoShawana
5 months agoRosita
5 months agoAudria
7 months agoMaricela
5 months agoDiane
5 months agoJuan
6 months agoLettie
7 months agoDonte
7 months agoMerilyn
7 months agoDeeann
7 months agoElina
7 months agoBernardine
8 months agoMitsue
5 months agoMicah
7 months agoBeckie
8 months ago