Container Security Explained

preview_player
Показать описание


Containers have become one of the most important technologies for modern IT infrastructure as they enable you to better manage your applications in a way that is portable, reusable, and automatable. This can help you reduce the amount resources needed to manage application infrastructure, but also introduces some new security risks.

In this lightboard video, Charles Neblett with IBM Cloud, covers a number of security vulnerabilities that may exist around the environment of your containers, as well as some good open source tools that you can use to help keep your containers secure.

#Containers #ContainerSecurity #CloudSecurity
Рекомендации по теме
Комментарии
Автор

Very well thought out and executed overview of the container threat landscape.

sushantgore
Автор

An advice: use an EQ on your audio track to lower the pencil sound. It's painful.

kras_mazov
Автор

Squeeks aside, this was very clear and informative.
Question, could you drop a quick vid on container security, regarding communication?
Something like your ideas on HTTP vs HTTPS between the containers and it's implications on securing deployments.

nunofernandes
Автор

every time you wrote with that marker, dogs started barking down the street...

larrydownard
Автор

Is the host OS the only place you can run things like antivirus and file integrity monitoring?

arnold-moger
Автор

I wish I had similar presentation skills !!! Super Cool.

chivukulasatish
Автор

That's what I was looking for, thank you !

AmitKumar-zcsq
Автор

can anyone response, if i have openshift does openshift provide central security tool that can tack care of all these things??

rky
Автор

Dumb question, but i am fascinated with this presentation style. How can I do this without having to learn to draw and write backwards? Or is this being done in a mirror?

christrudeau
Автор

Very simplified video compering at key elements.

Thank u

tabenatdylan
Автор

It is possible to use docker bench on containers inside kubernetes pods, if yes then how

R-Kannada-DevOps
Автор

Amazing intel, thanks for the source!

TheKillerview
Автор

You plan quantum computers but the pen is still creaking on the board 🤣🤣🤣

ritas
Автор

But why put applications in containers in the first place? It doesn't solve much, but it adds quite a lot of complexity.

MR-vjdn
Автор

The main "attack surface" is not even mentioned: Missing isolation of the container from the host.
There are not even any serious approaches for this.
What you talk about has ALL nothing to do with docker.
A system where you have to trust your hosting provider is not considered "safe".
You hand over all - and I mean ALL - of your data and secrets to who ever runs your "server".
This was impossible in earlier models where a root access was solely meant for the admin, NOT the ISP.

grehuy
Автор

The pen marker squeaks are driving me nuts ... wtf IBM, couldn't afford softer markers?

Lubaneca
Автор

Great deliverance. Helps me a lot to develop my knowledge to the relevant topic.

muhammadsiddique
Автор

I am contemplating about doing a Master's Thesis on, "Security of container solutions and orchestration frameworks in the context of Industrial Control S ystem". Any suggestions on this.

jksalamon
Автор

Just a reminder that IBM’s first attempt at cloud was buying the Weather Channel.

tomtomtomtom
Автор

The mark pen writing sounds like fingersnails scraping on a chalkboard.

amousfrank