Advanced Security Strategies for Containerized Workloads

Authors

  • Salma Zahir Department of Computer Science, University of Tunisia

Keywords:

Container Security, Docker, Kubernetes, Container Orchestration, Runtime Security

Abstract

Containerization has fundamentally transformed the way software is developed, deployed, and managed. By encapsulating applications and their dependencies into isolated environments, containers offer portability, efficiency, and scalability. However, these advantages come with unique security challenges that traditional security measures are not equipped to address. As container adoption continues to grow, so does the need for advanced security strategies that cater specifically to containerized workloads. This paper delves into these strategies, exploring the comprehensive security measures required throughout the container lifecycle, including image security, orchestration platform hardening, runtime security, and access control. By implementing these strategies, organizations can effectively safeguard their containerized environments against evolving threats, ensuring the integrity, confidentiality, and availability of their applications.

Downloads

Published

2022-11-05

How to Cite

Salma Zahir. (2022). Advanced Security Strategies for Containerized Workloads. ResearchBerg Review of Science and Technology, 2(1), 194–218. Retrieved from https://researchberg.com/index.php/rrst/article/view/209