Scanning for vulnerabilities and secrets
What exactly are vulnerabilities, or to be more accurate, Common Vulnerabilities and Exposures (CVE)?
A database of information security problems that have been made publicly known is called Common Vulnerabilities and Exposures. A number uniquely identifies each vulnerability from the list of all other entries in the database. This list is continuously reviewed and updated by experts who include any new vulnerabilities or exposures as soon as they are found.
Now, we can scan the various layers of our Docker images using specialist software, such as Snyk, to find software libraries that are known to have such CVE. If we find that our image is flawed, we should and can repair the issue by switching to a more recent version of the flawed library. The image will then need to be rebuilt.
But our work is not yet done. Security experts frequently find new CVE, as was already mentioned previously. As a result, a software library that was previously...