Ten Layers of Container Security
In this session, we'll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy …
Talk Title | Ten Layers of Container Security |
Speakers | Daniel Oh (Principal Technical Marketing Manager / CNCF Ambassador, Red Hat) |
Conference | Open Source Summit Europe |
Conf Tag | |
Location | Prague, Czech Republic |
Date | Oct 21-27, 2017 |
URL | Talk Page |
Slides | Talk Slides |
Video | |
In this session, we’ll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy at the container layer, 2) content security container registries, and secure access to container images, 3) build process controlling what can be deployed with a cluster container platform authentication and authorization, 4) networking isolation, 5) attached storage API management, 6) endpoint security, 7) SSO roles, 8) access management in a cluster federation. Increasingly complicated applications and demands for faster development are putting even more pressure on infrastructure, IT teams, and processes. It’s more important than ever to have the right technologies in place. Containers deliver applications faster and scale them more rapidly.