CloudDigital TransformationSecurity

A layered approach to container and Kubernetes security

Containers have garnered broad appeal through their ability to package an application and its dependencies into a single image that can be promoted from development to test to production. Containers help provide consistency across environments and across multiple deployment targets like physical servers, virtual machines (VMs), and private or public clouds. With containers, teams are better equipped to develop and manage the applications that deliver business agility.

Managing containers at scale requires orchestration. Kubernetes is the container orchestration platform of choice for the enterprise. Kubernetes clusters can be deployed on-premise, as well as in public, private, or hybrid clouds. For this reason, Kubernetes is an ideal platform for hosting cloudnative applications that require rapid scaling.

With many organizations now running essential services on containers, implementing container security has never been more critical. This whitepaper describes the key elements of security for containerized applications managed with Kubernetes.

    Full Name

    Business Email

    Phone

    Company Name

    Job Title

    By receiving this content your name, business e-mail address, title, and certain other professional information maybe passed onto Tech IQ Papers & Red Hat Sponsor for fulfilment of the content access request and follow up by e-mail or phone regarding the content. I understand I can unsubscribe at any time.

    Red Hat may use your personal data to inform you about its products, services, and events - by email. You may withdraw your consent at any time (see Privacy Statement for details).

    Red Hat may use your personal data to inform you about its products, services, and events - by phone. You may withdraw your consent at any time (see Privacy Statement for details).

    View Privacy Policy