How to improve the security of Linux containers

by | Nov 14, 2016

Software developers use Linux containers to save time and money, providing a mechanism to build much more manageable applications through development, testing and environments of implementation with a better security in the software life cycle as in their actions and scenarios.

According to Forrester, more than half of operations and IT development responsible see security as the biggest concern when adopting containers.

Red Hat Platforms and Containers Commercial Marketing Manager, Kimberly Craven, has offered a number of keys to expand Linux container security such as the need to use trusted sources.

More than 30% of official images in Docker Hub contain high priority vulnerabilities, BanyanOps has published in a recent study. Certifications created by Red Hat and other industry leaders ensure that all components come from trusted sources and that the packages of the platform are complete and updated with authenticity. The execution of the containers must be through certified host environments and the source of a container must be verified.

The host OS must be maintained by trusted engineers, and must be updated frequently with the latest security standards to avoid inheriting the dangerous security model provided by that host.

Any Linux container, like its contents, can become obsolete over time as new vulnerabilities are identified daily. A single vulnerability can break and put your entire infrastructure in danger. In summary, in order to maximize the benefits offered by containers, while ensuring safety, it is important for organizations to give importance to the source, content, isolation and trust in the time.

Source: TICBeat Blog

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content