This skill covers security best practices for containerized applications, including Docker image hardening, Kubernetes security configurations, image vulnerability scanning, and runtime protection.
Keywords: container security, Docker, Kubernetes, image scanning, Dockerfile, pod security, network policies, RBAC, container runtime, Trivy, Falco, gVisor, seccomp, AppArmor, distroless, rootless containers
| Image | Minimal base, vulnerability scanning, signing | Trivy, Cosign, Grype | | Build | Multi-stage builds, non-root, no secrets | Docker, Buildah, Kaniko | | Registry | Scanning, signing verification, access control | Harbor, ECR, ACR | | Runtime | Seccomp, AppArmor, read-only root | gVisor, Kata, Falco |
Container- und Kubernetes-Sicherheitsmuster, einschließlich Docker-Härtung, Image-Scanning, Pod-Sicherheitsstandards, Netzwerkrichtlinien, RBAC, Geheimnisverwaltung und Laufzeitschutz. Verwenden Sie es zum Sichern von Containeranwendungen, zum Erstellen sicherer Images oder zum Konfigurieren von Kubernetes-Sicherheitskontrollen. Quelle: melodic-software/claude-code-plugins.