securing-container-registry-with-harbor
mukul975/Anthropic-Cybersecurity-Skills
This guide details the comprehensive process of securing a container registry using Harbor. Learn how to implement advanced security features such as integrated vulnerability scanning (Trivy), image signing (Cosign/Notary), Role-Based Access Control (RBAC), and content trust policies. The workflow covers deployment, policy enforcement, and integrating external authentication like OIDC, ensuring compliant and secure image provenance for Kubernetes environments.