Summary
In this chapter, we learned about different problems around building secured container images for our applications and how TBS targets them with different capabilities. Later, we took a deep dive into the full anatomy of TBS to understand all its building blocks. After that, we walked through the installation process of TBS to get started with it. And finally, we saw how to perform various key operations on TBS. Using a solution such as TBS that is based on CNB is one of the most recommended approaches suggested by CNCF, and now, we can appreciate why that is the case.
In any Kubernetes environment, we deploy two different types of container images – either they belong to our application or a third-party software. Now that we’ve learned how to build secured container images for our applications using an out-of-box automation tool, in the next chapter, we will learn how to consume secured container images of popular open source software to provide backing services...