5 things DevOps needs to do to secure containers

Image by Pixabay
Do deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.
To read this article in full or to leave a comment, please click here
Read more: 5 things DevOps needs to do to secure containers
More antivirus and malware news?
- Microsoft Internet Explorer CVE-2015-6066 Remote Memory Corruption Vulnerability
- Even without breaches, don’t count on websites to hide that you have an account with them
- Want a good tech job? Report says open-source skills are hotter than ever
- Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking
- Resolved: PASS will be unavailable on 3/28
- New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous
- Belgian Tax Authority To Search For Taxpayers Using Foreign Crypto Exchanges
- Suspect arrested in 5-year-old kernel.org breach
- How do you locate wireless devices in a residence?
- WikiLeaks Set 21st Century Model for Cyber-Leak Journalism