[https://snyk.io/blog/10-docker-image-security-best-practices/](https://snyk.io/blog/10-docker-image-security-best-practices/)
Answers to your questions
[https://snyk.io/blog/10-docker-image-security-best-practices/](https://snyk.io/blog/10-docker-image-security-best-practices/)
[https://github.com/goodwithtech/dockle](https://github.com/goodwithtech/dockle) can detect some of security best practices in this article.
2. Least privileged user
3. Sign and verify images to mitigate MITM attacks
5. Don’t leak sensitive information to Docker images
7. Use COPY instead of ADD
10. Use a linter