As containers become a major part of many organizations’ IT workloads, it becomes crucial to consider the unique security threats that target such environments when building security solutions. The first step in this process is understanding the relevant attack landscape.| Microsoft Security Blog
Configure IP rules to enable access to an Azure container registry from selected public IP addresses or address ranges.| learn.microsoft.com
Store images for all types of container deployments and OCI artifacts, using Azure Container Registry.| azure.microsoft.com
Amazon Elastic Container Registry (ECR) is a fully managed Docker container registry that makes it easy to store, share, and deploy container images.| Amazon Web Services, Inc.
What is lateral movement? Learn how cybercriminals spread across networks undetected. Discover ways to block attackers from escalating access.| wiz.io
This article describes the Azure built-in roles for Azure role-based access control (Azure RBAC). It lists Actions, NotActions, DataActions, and NotDataActions.| learn.microsoft.com
Set up a private endpoint on a container registry and enable access over a private link in a local virtual network. Private link access is a feature of the Premium service tier.| learn.microsoft.com