This document discusses Docker container security. It covers five main security verticals: secure software supply chain, runtime security, infrastructure security, compliance, and provides a demo. The supply chain involves scanning and signing images. Runtime security focuses on identifying vulnerabilities and running only trusted images. Infrastructure security discusses access control and roles. Compliance addresses FIPS validation and audit logs. A demo then shows some of these security features in action.