Moving Images From Non-Production to Production
Explore methods to securely promote container images from non-production to production environments in Kubernetes. Understand the role of vulnerability scanning, configuration as code reviews, cryptographic image signing, and enforcement of policies within CI/CD pipelines to ensure only vetted images are deployed in production. Gain insights into building secure workflows to manage images safely in real-world Kubernetes scenarios.
We'll cover the following...
Many organizations have separate environments for development, testing, and production. Usually, development environments have fewer rules and are places where developers can experiment. This can involve non-standard images our developers eventually want to use in production. The following sections outline some measures we can take to ensure that only safe images get approved for production.
Vulnerability scanning
Vulnerability scanning should be at the top of the list for vetting images before allowing them into production. These services scan our images at a binary level and check their contents against databases of known security vulnerabilities (CVEs).
We should integrate vulnerability scanning into our CI/CD pipelines and implement policies that ...