Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

4.1.3. Container Security: ACR, ACI, and Container Apps

💡 First Principle: Container security starts with the images. Secure the registry, scan images for vulnerabilities, and monitor running containers.

Azure Container Registry (ACR) Security

FeaturePurpose
AuthenticationMicrosoft Entra ID, service principal, managed identity
Private EndpointPrivate network access
Content TrustSign images for integrity
Vulnerability ScanningMicrosoft Defender for Containers

ACR Authentication Methods

# Authenticate to ACR using Azure CLI
az acr login --name <registry-name>

# This is the correct command for Azure CLI authentication
# az acr config is for configuration, not authentication
# docker login is for Docker Hub, not ACR

⚠️ Exam Trap: Using az acr config instead of az acr login for authentication. az acr login authenticates to the registry; az acr config manages registry configuration settings.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications