Hybrid Cloud Security Patterns by Sreekanth Iyer

Hybrid Cloud Security Patterns by Sreekanth Iyer

Author:Sreekanth Iyer
Language: eng
Format: epub
Publisher: Packt Publishing Pvt ltd
Published: 2022-11-02T00:00:00+00:00


Securing containers

Let’s get started!

Problem

Patterns for securing containers.

Context

Containers provide a better way to efficiently use the underlying infrastructure compared to VMs. Application components and all dependencies are packed inside a container and executed in a secure way.

As shown in the following diagram, containers do not have any guest operating system. Instead, the container leverages the operating system and environment of the underlying layer:

Figure 5.9 – Containers

Containers bring several advantages, important one being build once, run anywhere. This is achieved by packing everything that an application needs into a container, thus isolating the application from the server on which it is running. A containerized application has everything it needs, packed as a container image. A container runtime (also known as container engine, which is a software component deployed on a host operating system) is needed to run containers. This image can be run on any machine, such as on a laptop or on a server in a cloud environment that has the container runtime deployed. Containerized applications can be deployed across a cluster of servers, leveraging container management platforms such as Kubernetes to automate this process. The security threats in a containerized environment are similar to deployments in a traditional environment. However, there are several changes in the way applications are run as containers. If we take a deeper look at the container threat model, there are several internal and external attackers involved, such as the following:

External attackers include people or processes trying to gain access to deployments or images from outside

Internal attackers are malicious insiders such as developers or administrators who have privileged access to the deployment as well as inadvertent actors who may have caused problems because of incorrect configuration



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.