Process Flow - Container vulnerability scanning
Start: Container Image Built
Push Image to Container Registry
Trigger Vulnerability Scan Automatically
Scan Image Layers for Vulnerabilities
Generate Vulnerability Report
Review Report & Take Action
Fix Vulnerabilities or Approve Image
Deploy Image
This flow shows how a container image is scanned for vulnerabilities automatically after being pushed to the registry, then reviewed before deployment.