Container security spans the full lifecycle of containerized workloads β from building images and managing secrets to runtime enforcement and supply chain integrity. Containers share the host kernel, so a misconfigured or compromised container can threaten the entire host; defense-in-depth across every layer is essential. Shift-left practices (scanning images at build time, enforcing policies in CI/CD) reduce risk dramatically before code ever reaches production. The landscape has matured significantly in 2025β2026: Kubernetes Pod Security Admission is now the standard gatekeeper, eBPF-based runtime enforcement has gone mainstream, supply chain attestations (SLSA, VEX) are table-stakes for production images, and AI/LLM workloads introduce an entirely new threat surface.
What This Cheat Sheet Covers
This topic spans 21 focused tables and 155 indexed concepts. Below is a complete table-by-table outline of this topic, spanning foundational concepts through advanced details.
Table 1: Image Vulnerability Scanning
| Tool | Example | Description |
|---|---|---|
trivy image nginx:latest | β’ Comprehensive scanner covering OS packages, language libraries, IaC, secrets, SBOMs, and VEX filtering β’ fastest scanner for CI/CD pipelines. | |
grype nginx:latest | β’ Anchore's vulnerability scanner β’ pairs with Syft for SBOM-driven scanning β’ supports VEX suppression via --vex flag. | |
docker scout cves nginx:latest | β’ Built into Docker Desktop and CLI β’ shows fix recommendations and policy compliance β’ integrates with Docker Hub. | |
snyk container test nginx:latest | β’ Developer-friendly scanner with IDE and CI plugins β’ surfaces base-image upgrade suggestions to reduce CVE counts. |