From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Container working environment

Container working environment - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Container working environment

- [Instructor] Let's assume that you implemented all of the security controls, such as secure design code, images, and registries, but your application has not come alive yet. It only comes to life and starts running when its image is instantiated as a container. That container, which is nothing but a Linux process, needs an environment and resources to run. If you recall, it needs a container runtime, it needs a host OS, and the capabilities offered by the OS. This environment needs to be secured. You can instantiate a container using a Docker command or in Kubernetes by submitting a part definition to an API server. While doing so, you may override and effectively undo the security configurations you may have put in place at the time of creating images. So let's walk through some security controls to protect the container environment and the host starting with the containers. You know that in your Docker file, you…

Contents