Part 5: Supply Chain Security
Secure the software supply chain with image security, vulnerability scanning, static analysis, and admission controllers.
Modules
Section titled “Modules”| Module | Description |
|---|---|
| Module 5.1: Container Image Security | Base images, multi-stage builds, and image hardening |
| Module 5.2: Image Scanning with Trivy | Automated vulnerability scanning for container images |
| Module 5.3: Static Analysis with kubesec and OPA | Analyzing Kubernetes manifests for security issues |
| Module 5.4: Admission Controllers | Validating and mutating admission webhooks |