Securing containers requires a different approach. Since containers run on a shared host and typically use multiple components to deliver a complete solution, there are many considerations that are required to secure container environment. This page gathers resources about managing security in containers including security considerations, security best practices and more.
Table of Contents:
Below we have compiled publicly available sources from around the world that present views on Container Security Management.
The Container Security book by Liz Rice
Fundamental Technology Concepts that Protect Containerized Applications
Perspectives on Container Security Management
-
Securosis Analyst Report 2018: The Complete Guide to Enterprise Container Security
In this comprehensive 24 page report, updated for 2018, Securosis provide a complete overview of the security implications of using containers and actionable insights for implementing best practices.
-
5 Keys to Conquering Container Security
When it comes to enterprise application development, security is still an afterthought, coming in right before a release is deployed. The rapid adoption of software containers presents a rare opportunity for security to move upstream and become integrated early on and throughout the software delivery pipeline.
-
info.aquasec.com
-
em360tech.com
-
blog.reblaze.com
-
techbeacon.com
-
developer.okta.com
-
alibabacloud.com
-
-
-
securosis.com
-
docker.com
How To
-
aws.amazon.com
Docker Security Management
-
Docker Security Best Practices 2017
Docker containers are not inherently less secure than running applications without them -- in fact, the opposite is true. But they need to be used correctly.
-
infoworld.com
-
sumologic.com
-
networkcomputing.com
Kubernetes Security Management
-
slideshare.net
-
stratoscale.com
-
Specific Technologies
-
medium.com
Training
-
katacoda.com
Further Reading
- No labels