Chapter 12: Introduction to Container Security
When developing technical projects, security should be a fundamental concern. We live in a world surrounded by security threats, from malware and viruses to data breaches. Being the victim of cybercrime or information leaks can have increasingly negative consequences, especially under regulations such as the EU's General Data Protection Regulation (GDPR).
When breaches or compromises do happen, having the ability to limit their scope through good architectural practices is a must. This is achieved through the concept of limiting what is called lateral movement. By this, we mean using one breached system to access another, thereby providing the attacker with the ability to traverse through your system, compromising further systems and stealing data.
Thankfully, containerization, when deployed correctly, can help you improve your security posture through a variety of features that will be explored in the final section of this...