Adopt a Vulnerability Patching Procedure
Images are the building blocks for containers, and as companies increase their use of container technology, they’re accumulating more and more images. Some of these images will be developed in house, while others will come from vendor and open-source resources. These images can be further layered with additional functionality. That’s the beauty of containers, but as the use—and number—of container components grows, so, too, does the risk that a component will be compromised somehow. Organizations need to ensure they have a system in place to scan for and patch any vulnerabilities that exist in container components.