Security baseline and considerations
All cloud resources should consider security to be their priority. That said, you should always ensure that your service uses all the security features that are required for your business case. In Container Instances, you have access to the following security areas:
- Networking
- Monitoring and logging
- Access control
There are, of course, even more areas to consider here:
- Web access security
- Data protection
- Incident management
- Pen testing
When creating a Container Instance service, you can configure network access and ports that are open in your instance of the service, as shown in the screenshot:
Figure 4.11 – Networking configuration
As you can see, there are three different types of networking available:
- Public, which allows connections from everywhere
- Private, which can integrate Container Instances with a network of your choice
- None, which completely...