CN213 Mirantis Secure Registry (MSR)

Live Online (VILT) & Classroom Corporate Training Course

edForce New Partnership with Mirantis

Explore the features of Mirantis Secure Registry (MSR) for bolstering container image security. Learn installation, configuration, access control, and integration with CI/CD pipelines.

How can we help you?


  • CloudLabs

  • Projects

  • Assignments

  • 24x7 Support

  • Lifetime Access

CN213 Mirantis Secure Registry (MSR)

Overview

This course delves into the comprehensive features of Mirantis Secure Registry (MSR), exploring its capabilities in bolstering container image security throughout the production, storage, and distribution phases. Whether utilized as a standalone registry or integrated into a continuous integration pipeline, participants will gain insights into installation, configuration, user permission management, security enhancements, and registry management strategies.

Objectives

By the end of this course, leaner will be able to:

  • Understand the architecture of Mirantis Secure Registry (MSR).
  • Deploy MSR using production-grade patterns.
  • Configure MSR components within containerized environments.
  • Implement access control and role-based access control (RBAC) in MSR.
  • Utilize content trust mechanisms to enhance security.

Prerequisites

  • Basic understanding of containerization concepts.
  • Familiarity with system administration and operations.
  • Proficiency in using Chrome or Firefox browsers.
  • Access to a laptop with WiFi connectivity.
  • Registration for a free account on strigo.io.

Course Outline

Module 1: Introduction to Mirantis Secure Registry (MSR)2024-03-31T12:26:12+05:30
  • Overview of container image security challenges.
  • Introduction to MSR and its significance in enhancing security.
  • Explanation of key concepts and terminology.
Module 2: Deploying and Configuring MSR2024-03-31T12:27:03+05:30
  • Understanding MSR architecture and deployment patterns.
  • Containerized components overview.
  • Networking and system requirements.
  • High availability deployment via Launchpad.
Module 3: Access Control and Security Mechanisms2024-03-31T12:27:49+05:30
  • Managing user permissions in MSR.
  • Implementing Role-Based Access Control (RBAC) system.
  • Utilizing content trust mechanisms.
  • Defending against man-in-the-middle attacks with The Update Framework & Notary.
Module 4: Security Scanning and Integration2024-03-31T12:28:40+05:30
  • Auditing container images for vulnerabilities.
  • Setting up security scanning in MSR.
  • Integrating security scans into continuous integration pipelines.
Module 5: Registry Management Strategies2024-03-31T12:29:28+05:30
  • Image pruning and garbage collection strategies.
  • Registry sizing considerations.
  • Implementing content caching for distributed teams.
  • Automation of repository tasks.
2024-05-03T18:01:21+05:30

Title

Go to Top