
With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift. You may be struggling to figure out how to secure this new class of assets and the environments they reside in.
Introducing good security hygiene into the container ecosystem is not a simple task. This paper will cover all the high points of what it means to secure the entire container stack, including:
- The three phases of the container lifecycle
- How to incorporate security into the container pipeline
- Tips for securing container registries, orchestrators and continuous integration (CI) tools
- What it means to take an immutable approach to container security
|
|
|
Security Controls: The Key to Ensuring 'Security in the Cloud'
Organizations face a number of security challenges when migrating to the cloud from on-premise data centers. Their work isn’t done once they’ve completed the move, either. At that stage, enterprises must decide on the best approach to fulfill their end of the Shared Responsibility Model and ensure “security in the cloud” with respect to protecting their data.
|
|
|
|
|
Why We Believe Georgia's S.B. 315 Bill Will Increase Cybersecurity Risk
In 2017, an independent security researcher discovered that a vulnerability had been exploited in the Kennesaw State University Election Center. The researcher responsibly reported the breach to authorities. In response, the Georgia Attorney General’s office requested that a bill (be drafted to criminalize any unauthorized access to any computer or network, even if the access is non-malicious and results in no harm such as independent white-hat security research.
|
|
|
|
|
20 CIS Controls: Control 4 – Controlled Use of Administrative Privileges
Today, Travis Smith will be going over Control 4 from version 7 of the top 20 CIS Controls – Controlled Use of Administrative Privileges. Travis will go through the nine requirements and offer his thoughts on what he has found.
|
|
|
|
The State of Security now publishes a daily digest to help you stay informed on all the latest security threats and trends. Save time by letting the best security news and featured content come to you!
|
|
|
|
|