ACR security best practices
To protect container image assets in our registries, there are certain security configurations that we should implement. In this book, we will cover the following security best practices:
- Configuring service firewall rules (premium only)
- Restricting access using a private endpoint (premium only)
- Using Azure AD role-based access control (RBAC) for secure authentication and access control
- Implementing container image vulnerability and compliance scanning
In the following sections, we will cover these best practices in detail so that you can gain an understanding of them and the risks they help us to mitigate. Additionally, you have an upcoming hands-on exercise to complete where you will be able to implement some of these best practices.
Configuring service firewall rules for ACR
To pull or push images to ACR, a client, such as a Docker daemon running on a developer's laptop, or an Azure pipeline agent needs to interact...