December 24, 2019

198 words 1 min read

Ten Layers of Container Security

Ten Layers of Container Security

In this session, we'll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy …

Talk Title Ten Layers of Container Security
Speakers Daniel Oh (Principal Technical Marketing Manager / CNCF Ambassador, Red Hat)
Conference Open Source Summit Europe
Conf Tag
Location Prague, Czech Republic
Date Oct 21-27, 2017
URL Talk Page
Slides Talk Slides
Video

In this session, we’ll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy at the container layer, 2) content security container registries, and secure access to container images, 3) build process controlling what can be deployed with a cluster container platform authentication and authorization, 4) networking isolation, 5) attached storage API management, 6) endpoint security, 7) SSO roles, 8) access management in a cluster federation. Increasingly complicated applications and demands for faster development are putting even more pressure on infrastructure, IT teams, and processes. It’s more important than ever to have the right technologies in place. Containers deliver applications faster and scale them more rapidly.

comments powered by Disqus