1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/security/container_security/security-deploy.adoc

33 lines
1.2 KiB
Plaintext
Raw Normal View History

:_mod-docs-content-type: ASSEMBLY
2020-06-23 11:17:33 -04:00
[id="security-deploy"]
= Deploying containers
2022-02-16 11:35:56 -05:00
include::_attributes/common-attributes.adoc[]
2020-06-23 11:17:33 -04:00
:context: security-deploy
toc::[]
You can use a variety of techniques to make sure that the containers you
deploy hold the latest production-quality content and that they have not
been tampered with. These techniques include setting up build triggers to
incorporate the latest code and using signatures to ensure that the container
comes from a trusted source and has not been modified.
// Controlling container deployments with triggers
include::modules/security-deploy-trigger.adoc[leveloffset=+1]
// Controlling what image sources can be deployed
include::modules/security-deploy-image-sources.adoc[leveloffset=+1]
// Signature transports
include::modules/security-deploy-signature.adoc[leveloffset=+1]
// Secrets and ConfigMaps
include::modules/security-deploy-secrets.adoc[leveloffset=+1]
// Continuous deployment tooling
include::modules/security-deploy-continuous.adoc[leveloffset=+1]
2022-02-17 13:08:23 -05:00
[role="_additional-resources"]
2020-06-23 11:17:33 -04:00
.Additional resources
* xref:../../cicd/builds/creating-build-inputs.adoc#builds-input-secrets-configmaps_creating-build-inputs[Input secrets and config maps]