From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Secure design before code

Secure design before code - Kubernetes Tutorial

From the course: Securing Containers and Kubernetes Ecosystem

Start my 1-month free trial

Secure design before code

- [Teacher] Every enterprise goal is that its containers in production are not only free today, but remain free of security vulnerabilities. It is also expected that these containers remain compliant with the organization's security policies at all times. So it is natural to believe that scanning and monitoring your containers and kubernetes environment for security and policy violations is going to be imperative. But is that enough? Don't get me wrong. Such security controls are extremely important and necessary as you will see in the later chapters, but they are not sufficient. Why? Because by the time you end up scanning thousands of running containers, not only you have missed an opportunity to catch a security bug early on, but you're also being inefficient as well. If these containers are instantiated from the same image, you could have found many configuration defects and vulnerabilities from that one single…

Contents