Chapter 11: Securing Containers
Security is becoming the hottest topic of current times. Enterprises and companies all over the world are making huge investments in security practices and tools that should help protect their systems from internal or external attacks.
As we saw in Chapter 1, Introduction to Container Technology, containers and their host systems can be considered a medium to execute and keep a target application running. Security should be applied to all levels of the service architecture, from the base infrastructure to the target application code, all while passing through the virtualization or containerization layer.
In this chapter, we will look at the best practices and tools that could help improve the overall security ...
Get Podman for DevOps now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.