A new container security cheat sheet and report has been announced, outlining 8 best practices for implementing a modern approach to container security that focuses on secure code, runtime scanning, and threat prioritization. The guide emphasizes the need for developers to take control of application security from source code to runtime, with a focus on automation and integration with existing workflows. Key strategies include using source code scanning tools, software composition analysis (SCA) tools, image security, runtime security, network security, Kubernetes and cloud security, vulnerability prioritization using runtime signals, and securing containers from within the development pipeline. The goal is to provide developers with a developer-first approach to container security that scales and aligns with the iterative DevOps model.