The talk discusses how to prioritize and remediate vulnerabilities in container images by understanding how they are constructed and where potential vulnerabilities can come from.
- Container images are constructed in layers, some of which come from base images and parent images
- Understanding how software gets into the images is key to deciding on a strategy for minimizing vulnerabilities
- Prioritizing and fixing high severity vulnerabilities with available fixes is a good starting point
- Security in containers should be multi-layered and consider infrastructure misconfigurations
- Containers are often run in orchestration systems like Kubernetes, and security principles for Kubernetes should be followed