Process Flow - Image security scanning
Start: New Container Image
Trigger Scan on Image
Scan Image for Vulnerabilities
Report Vulnerabilities Found?
No→Approve Image
Yes
Block or Alert
Deploy or Reject Image
The flow starts with a new container image, triggers a scan, checks for vulnerabilities, then either approves or blocks deployment based on scan results.