Maintaining container images is often a task that is overlooked. And as containers provide excellent scaling capabilities, a small problem can escalate in a matter of minutes. A security nightmare in the making. We write new code, build it and rebuild the container image containing our newly written code. But who's looking after the security of operating system components inside that image? Ensuring the security of your container image requires an approach that targets different parts of your build and run processes. During this session we will go through the steps of securing your container images as part of your build and run processes and use technologies such as GitHub Actions, Trivy, Copa, Azure Container Registry and Microsoft Defender for Cloud.
Wesley is a Microsoft Azure MVP and is working as a Principal Azure Architect at Intercept. His day to day activities include designing, implementing and optimizing Azure solutions, focused on Cloud Native (Kubernetes), platform engineering, serverless and automating cloud operations. When he’s not working on a project, he’s giving a workshop, training or test-driving new Azure features. As a big advocate of Cloud Native, Infrastructure as Code and DevOps you will probably hear him talking about any of these subjects at least a few times a day (or hour). If you want to talk Azure, get in touch!