This skill covers security best practices for containerized applications, including Docker image hardening, Kubernetes security configurations, image vulnerability scanning, and runtime protection.
Keywords: container security, Docker, Kubernetes, image scanning, Dockerfile, pod security, network policies, RBAC, container runtime, Trivy, Falco, gVisor, seccomp, AppArmor, distroless, rootless containers
| Image | Minimal base, vulnerability scanning, signing | Trivy, Cosign, Grype | | Build | Multi-stage builds, non-root, no secrets | Docker, Buildah, Kaniko | | Registry | Scanning, signing verification, access control | Harbor, ECR, ACR | | Runtime | Seccomp, AppArmor, read-only root | gVisor, Kata, Falco |
Container and Kubernetes security patterns including Docker hardening, image scanning, pod security standards, network policies, RBAC, secrets management, and runtime protection. Use when securing containerized applications, building secure images, or configuring Kubernetes security controls. Source: melodic-software/claude-code-plugins.