<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Docker on Romano Roth</title><link>https://romanoroth.com/en/tags/docker/</link><description>Recent content in Docker on Romano Roth</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Romano Roth</copyright><lastBuildDate>Thu, 09 Feb 2023 00:00:00 +0000</lastBuildDate><atom:link href="https://romanoroth.com/en/tags/docker/index.xml" rel="self" type="application/rss+xml"/><item><title>GitHub DevSecOps Part 6: How to Use Container Scanning</title><link>https://romanoroth.com/en/blogs/github-devsecops-container-scanning/</link><pubDate>Thu, 09 Feb 2023 00:00:00 +0000</pubDate><guid>https://romanoroth.com/en/blogs/github-devsecops-container-scanning/</guid><description>&lt;p>We have built up the GitHub Actions pipeline through five sessions: the project basics, software composition analysis, license compliance, and static application security testing. The next layer is container scanning — looking for vulnerabilities inside the Docker image we ship, not just in the source we wrote. In Part 6 of our series, Patrick Steger and I split the work into two GitHub Actions sub-workflows: one builds the image and pushes it to the registry, the other pulls it back and runs Trivy on it.&lt;/p></description></item><item><title>GitLab DevSecOps Part 6: How to Use Container Scanning</title><link>https://romanoroth.com/en/blogs/gitlab-devsecops-container-scanning/</link><pubDate>Tue, 06 Sep 2022 00:00:00 +0000</pubDate><guid>https://romanoroth.com/en/blogs/gitlab-devsecops-container-scanning/</guid><description>&lt;p>We have already wired SAST, secret detection, and software composition analysis into the GitLab pipeline. Those checks cover the source code and its dependencies — but the artifact we actually ship is a container image. Operating system packages, the base image, and everything copied in along the way can carry vulnerabilities of their own. In Part 6 of our series, Patrick Steger and I add container scanning to the pipeline, build a Docker image from the jar we compiled earlier, and push it through Trivy and Grype.&lt;/p></description></item></channel></rss>