Specifying security requirements for containers
Containers have become a critical compute component used for modernizing applications to utilize the resiliency, elasticity, and flexibility benefits of cloud technologies. Containers run on hosts where Microsoft provides security monitoring. As a cybersecurity architect, you need to secure the computing resources and the code within the container registry to avoid vulnerabilities and potential threats. Some of the baseline requirements that you should consider are as follows:
- Since containers are an isolated, lightweight portion of a compute host with a host operating system used to run the application, the protection of the API and services for the application, as well as the runtime services, should be hardened and protected.
- You should ensure that access and authorization to the container utilizes the principles of least privilege to decrease the attack surface.
- Containers use images of multiple layers, and each layer...