Validating and verifying container images with Binary Authorization
The amount of time I have now spent harping on about containers has probably clued you into the fact that containers may be somewhat important. Containers are, of course, an encapsulation of all the resource requirements and libraries that are specifically needed to run one service in an application. Containers being isolated from each other results in the elimination of conflict between the libraries required to run the services in each container, effectively creating an isolated system for each service in an overall large system or application.
However, this also presents a two-fold vulnerability: complexity and a larger threat vector in some circumstances. Handling all of these containers and the complex underlying libraries that lie within them (thus the need for Kubernetes) can be a difficult task. Managing these complex systems improperly can lead to the creation of structural and informational vulnerabilities...