Skip to content

Commit 4219284

Browse files
committed
Fix a typo
Signed-off-by: Usha Mandya <[email protected]>
1 parent 5cf0154 commit 4219284

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

develop/scan-images/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@ description: Scan images best practices guide
44
keywords: docker scan, scan, images, snyk, vulnerability
55
---
66

7-
This page contains recommendation and best practices for scanning and building secure images.
7+
This page contains recommendations and best practices for scanning and building secure images.
88

9-
Docker and Snyk have partnered together to bring security natively into the development workflow by providing a simple and streamlined approach for developers to build and deploy secure containers. Container security spans multiple teams - developers, security, and operations. Additionally, there are multiple layers of security that apply to containers:
9+
Docker and Snyk have partnered together to bring security natively into the development workflow by providing a simple and streamlined approach for developers to build and deploy secure containers. Container security spans multiple teams - developers, security, and operations. Additionally, there are multiple layers of security that apply to containers:
1010

1111
- The container image and the software running inside
1212
- The interaction between a container, the host operating system, and other containers on the same host
1313
- The host operating system
1414
- Container networking and storage
1515

16-
Including the vulnerability scanning options into the Docker platform extends the existing, familiar process of vulnerability detection, and allows for remediation of vulnerabilities earlier in the development process. This process of simple and continuous checks leads to fewer vulnerabilities checked into Docker Hub, a shorter CI cycle, and faster and more reliable deployment into production.
16+
Including the vulnerability scanning options into the Docker platform extends the existing, familiar process of vulnerability detection, and allows for remediation of vulnerabilities earlier in the development process. This process of simple and continuous checks leads to fewer vulnerabilities checked into Docker Hub, a shorter CI cycle, and faster and more reliable deployment into production.
1717

1818
![Developer's security journey](/images/dev-security-journey.png){:width="700px"}
1919

0 commit comments

Comments
 (0)