Q: 11
A security team is reviewing an image assessment report for a containerized application. The report
indicates multiple high-severity Common Vulnerabilities and Exposures (CVEs) related to outdated
system libraries in the base image. What is the best course of action to mitigate these vulnerabilities
before deploying the container?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.