Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
4.1.3. Container Security: ACR, ACI, and Container Apps
💡 First Principle: Container security starts with the images. Secure the registry, scan images for vulnerabilities, and monitor running containers.
Azure Container Registry (ACR) Security
| Feature | Purpose |
|---|---|
| Authentication | Microsoft Entra ID, service principal, managed identity |
| Private Endpoint | Private network access |
| Content Trust | Sign images for integrity |
| Vulnerability Scanning | Microsoft Defender for Containers |
ACR Authentication Methods
# Authenticate to ACR using Azure CLI
az acr login --name <registry-name>
# This is the correct command for Azure CLI authentication
# az acr config is for configuration, not authentication
# docker login is for Docker Hub, not ACR
⚠️ Exam Trap: Using az acr config instead of az acr login for authentication. az acr login authenticates to the registry; az acr config manages registry configuration settings.
Written byAlvin Varughese
Founder•15 professional certifications