Container Security Management

Securing containers requires a different approach. Since containers run on a shared host and typically use multiple components to deliver a complete solution, there are many considerations that are required to secure container environment. This page gathers resources about managing security in containers including security considerations, security best practices and more.

Table of Contents:

Below we have compiled publicly available sources from around the world that present views on Container Security Management.

The Container Security book by Liz Rice

Fundamental Technology Concepts that Protect Containerized Applications

Perspectives on Container Security Management

Securosis Analyst Report 2018: The Complete Guide to Enterprise Container Security

In this comprehensive 24 page report, updated for 2018, Securosis provide a complete overview of the security implications of using containers and actionable insights for implementing best practices.

Read the article on aquasec.com »

5 Keys to Conquering Container Security

When it comes to enterprise application development, security is still an afterthought, coming in right before a release is deployed. The rapid adoption of software containers presents a rare opportunity for security to move upstream and become integrated early on and throughout the software delivery pipeline.

ead the article on infoworld.com »

Docker Security Management

Docker Security Best Practices 2017

Docker containers are not inherently less secure than running applications without them – in fact, the opposite is true. But they need to be used correctly.

Specific Technologies

Get updates on container technology