Secure Supply Chain and Container Deployment | Reactor Summer Series
In this session (#3 of 3), we will:
Understand the importance of secure supply chain practices in container deployment and management.
Learn how to use container image scanning tools to identify vulnerabilities in container images.
Explore best practices for securing containerized applications in production.
Build a CI/CD pipeline that scans, signs and deploys container images to AKS with GitHub Actions
Deploy and Configure Ratify and Gatekeeper to prevent unauthorized container images from running on AKS
Register for the other sessions in this series at https://developer.microsoft.com/reactor/series/S-1184
[eventID:20360]