@@ -191,7 +191,9 @@ and [`ClusterImageCatalog-bookworm.yaml`](Debian/ClusterImageCatalog-bookworm.ya
191191manifests, please migrate to the new catalogs as soon as possible. These legacy
192192manifests are deprecated and will be removed along with the ` system ` image.
193193
194- ## Build Attestations
194+ ## Security
195+
196+ ### Build Attestations
195197
196198CNPG PostgreSQL Container Images are built with the following attestations to
197199ensure transparency and traceability:
@@ -216,7 +218,7 @@ docker buildx imagetools inspect <IMAGE> \
216218This command outputs the SBOM in JSON format, providing a detailed view of the
217219software components and build dependencies.
218220
219- ## Image Signatures
221+ ### Image Signatures
220222
221223The [ ` minimal ` ] ( #minimal-images ) and [ ` standard ` ] ( #standard-images ) CloudNativePG container images are securely signed using
222224[ cosign] ( https://github.com/sigstore/cosign ) , a tool within the
@@ -239,6 +241,18 @@ cosign verify IMAGE \
239241 --certificate-oidc-issuer=" https://token.actions.githubusercontent.com"
240242```
241243
244+ ## Image Scanning in CI/CD
245+
246+ To further strengthen the security of our container images, we perform
247+ automated image scanning as part of our CI/CD workflows. These scans help
248+ ensure that our images adhere to best practices and remain free of known
249+ vulnerabilities before they are published or deployed:
250+
251+ - ** Dockle** : Verifies configuration best practices for container images. Runs
252+ during the build stage; critical failures can block the build.
253+ - ** Snyk** : Detects vulnerabilities in OS packages, libraries, and dependencies
254+ within the container. Runs after image build.
255+
242256## Building Images
243257
244258For detailed instructions on building PostgreSQL container images, refer to the
0 commit comments