Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Week 5: demo proposal #2428

Closed
wants to merge 1 commit into from
Closed

Week 5: demo proposal #2428

wants to merge 1 commit into from

Conversation

Stellariser
Copy link
Contributor

Assignment Proposal

Title

Dockerfile Compliance Scanning with Docker Bench and Trivy

Names and KTH ID

Peiyang Zheng ([email protected])

Tianning Liang ([email protected])

Deadline

Week 5

Category

Demo

Description

In this demo, we will focus on how Dockerfile compliance scanning can be integrated into an Infrastructure as Code (IaC) workflow to ensure the security and stability of containerized applications. We will use tools such as Docker Bench and Trivy to automatically scan Dockerfiles and Docker images for security vulnerabilities and best practice violations.

The demo will walk through the process of writing a non-compliant Dockerfile, running compliance scans, and fixing the detected issues. We will show how these tools can be integrated into a CI/CD pipeline to ensure that Docker containers, as part of an IaC workflow, are compliant with security and operational standards. By automating the scanning process, we reduce the risk of deploying vulnerable containers in production environments, which is critical for maintaining infrastructure security.

Relevance

Docker containers are a key component in modern Infrastructure as Code practices, as they are widely used to package applications and services. Ensuring the compliance and security of Docker containers is an essential step in managing infrastructure at scale. This demo is relevant by demonstrating how to use compliance scanning tools to enforce security standards in containerized environments. By integrating these scans into an IaC pipeline, we can automate compliance checks and improve the reliability and security of infrastructure deployments.

@DD2485-bot
Copy link

Readme is not correctly formatted
Need exactly: ['Assignment Proposal', 'Title', 'Names and KTH ID', 'Deadline', 'Category', 'Description']

Got: ['Assignment Proposal', 'Title', 'Names and KTH ID', 'Deadline', 'Category', 'Description', 'Relevance']

@Stellariser Stellariser closed this Sep 5, 2024
@Stellariser Stellariser reopened this Sep 5, 2024
@Stellariser Stellariser closed this Sep 5, 2024
@DD2485-bot
Copy link

Readme is not correctly formatted
Need exactly: ['Assignment Proposal', 'Title', 'Names and KTH ID', 'Deadline', 'Category', 'Description']

Got: ['Assignment Proposal', 'Title', 'Names and KTH ID', 'Deadline', 'Category', 'Description', 'Relevance']

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants