Home Cyber News Securing the Entire Container Stack, Lifecycle and Pipeline

Securing the Entire Container Stack, Lifecycle and Pipeline

0
976

Securing the Entire Container Stack, Lifecycle and Pipeline

Implement excellent security at each stage of the container pipeline
 

With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift. You may be struggling to figure out how to secure this new class of assets and the environments they reside in.

Introducing good security hygiene into the container ecosystem is not a simple task. This paper will cover all the high points of what it means to secure the entire container stack, including:

  • The three phases of the container lifecycle
  • How to incorporate security into the container pipeline
  • Tips for securing container registries, orchestrators and continuous integration (CI) tools
  • What it means to take an immutable approach to container security
Download Now

Security Controls: The Key to Ensuring 'Security in the Cloud'

Organizations face a number of security challenges when migrating to the cloud from on-premise data centers. Their work isn’t done once they’ve completed the move, either. At that stage, enterprises must decide on the best approach to fulfill their end of the Shared Responsibility Model and ensure “security in the cloud” with respect to protecting their data.
 

Read More

Why We Believe Georgia's S.B. 315 Bill Will Increase Cybersecurity Risk

In 2017, an independent security researcher discovered that a vulnerability had been exploited in the Kennesaw State University Election Center. The researcher responsibly reported the breach to authorities. In response, the Georgia Attorney General’s office requested that a bill (be drafted to criminalize any unauthorized access to any computer or network, even if the access is non-malicious and results in no harm such as independent white-hat security research.

Read More

20 CIS Controls: Control 4 – Controlled Use of Administrative Privileges

Today, Travis Smith will be going over Control 4 from version 7 of the top 20 CIS Controls – Controlled Use of Administrative Privileges. Travis will go through the nine requirements and offer his thoughts on what he has found.

 

Read More

©2018 Tripwire, Inc., All rights reserved.
You signed up for this newsletter on The State of Security blog.

Our mailing address is:

Tripwire, Inc.

101 SW Main St
Ste #1500

Portland, OR 97204

Add us to your address book

View it in your browser.

– Read more