Hybrid Cloud Security Patterns by Sreekanth Iyer
Author:Sreekanth Iyer
Language: eng
Format: epub
Publisher: Packt Publishing Pvt ltd
Published: 2022-11-02T00:00:00+00:00
Securing containers
Letâs get started!
Problem
Patterns for securing containers.
Context
Containers provide a better way to efficiently use the underlying infrastructure compared to VMs. Application components and all dependencies are packed inside a container and executed in a secure way.
As shown in the following diagram, containers do not have any guest operating system. Instead, the container leverages the operating system and environment of the underlying layer:
Figure 5.9 â Containers
Containers bring several advantages, important one being build once, run anywhere. This is achieved by packing everything that an application needs into a container, thus isolating the application from the server on which it is running. A containerized application has everything it needs, packed as a container image. A container runtime (also known as container engine, which is a software component deployed on a host operating system) is needed to run containers. This image can be run on any machine, such as on a laptop or on a server in a cloud environment that has the container runtime deployed. Containerized applications can be deployed across a cluster of servers, leveraging container management platforms such as Kubernetes to automate this process. The security threats in a containerized environment are similar to deployments in a traditional environment. However, there are several changes in the way applications are run as containers. If we take a deeper look at the container threat model, there are several internal and external attackers involved, such as the following:
External attackers include people or processes trying to gain access to deployments or images from outside
Internal attackers are malicious insiders such as developers or administrators who have privileged access to the deployment as well as inadvertent actors who may have caused problems because of incorrect configuration
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15881)
The Mikado Method by Ola Ellnestam Daniel Brolund(13143)
Hello! Python by Anthony Briggs(12973)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12165)
Dependency Injection in .NET by Mark Seemann(12014)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10791)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10595)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10536)
Grails in Action by Glen Smith Peter Ledbrook(10086)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9949)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9447)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(8664)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8629)
The Kubernetes Operator Framework Book by Michael Dame(8482)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8304)
Robo-Advisor with Python by Aki Ranin(8258)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)