Access your Pro+ Content below.
A layered approach to container and Kubernetes security
This article is part of the Shift in the Open With Containers issue of May 10, 2021
Containers have garnered broad appeal through their ability to package an application and its dependencies into a single image that can be promoted from development, to test, and to production. Containers make it easy to ensure consistency across environments and across multiple deployment targets like physical servers, virtual machines (VMs), and private or public clouds. With containers, teams can more easily develop and manage the applications that deliver business agility. When managing container deployment at scale, you need to consider: Which containers should be deployed to which hosts? Which host has more capacity? Which containers need access to each other and how will they discover each other? How do you control access to and management of shared resources such as network and storage? How do you monitor container health? How do you automatically scale application capacity to meet demand? How do you enable developer self-service while also meeting security requirements? Building security into your applications is ...
News in this issue
Learn how migrating legacy applications to containers can remove many of the barriers to modernization.
Find out more about the three pillars of end-to-end data protection in Kubernetes in this analyst report from GigaOm. Your download awaits.
Find out what you need to know about implementing a layered approach to container and Kubernetes security. Download the details today.
Applications are an essential part of digital business operations. Kubernetes-based container environments speed application development, deployment, and management. Red Hat and AWS can help you navigate IT complexity to adopt Kubernetes more quickly and easily.
Red Hat and Microsoft provide a production-ready, containerized environment with a hybrid cloud foundation.