From the course: Microservices: Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Container runtime security

Container runtime security

From the course: Microservices: Security

Start my 1-month free trial

Container runtime security

- [Instructor] To receive the full benefits of a microservice architecture, it takes a flexible execution environment that allows for rapid yet stable deployments. This is why the majority of developers choose to deploy microservices inside of containers. And in most cases, that means Docker. Like each new technology in the stack, containers have their own attack surface and expose new attack vectors. When running microservices on containers, security measures can be applied to harden various components within the architecture, including the host and the container runtime. The host where the container engine is installed is a starting point for securing the container platform. It should have a very limited number of users that can access it directly. If you're using a container orchestrator like Kubernetes, this number should be even smaller, because the need to access the host is diminished. When choosing an operating…

Contents