Shift-left security with image scanning. Trivy, policy gates, and runtime integration.
Catching vulnerabilities in images before they run in production is a security best practice. Here’s how to do it.
trivy image --exit-code 1 --severity CRITICAL,HIGH myimage:tag
Image scanning is one part of defense in depth; combine with minimal images and supply chain signing.
Get the latest tutorials, guides, and insights on AI, DevOps, Cloud, and Infrastructure delivered directly to your inbox.
A working AWS security baseline, derived from the actual incidents we've had and the audit findings we've cleared.
Concrete systemd unit patterns that reduced flakiness: restart policies, resource limits, and structured logs.
Explore more articles in this category
Helm gives you a lot of rope. The patterns we used that backfired, the ones we replaced them with, and what to skip if you're starting today.
We run three different job queue systems across our services. The patterns that work across all of them, the differences that matter, and the operational gotchas.
We adopted Backstage for service catalogs and templates. What works, what was over-engineered for our size, and what we'd do differently.