Threat Modeling for Containers

ACM.7 Security considerations for containers used by batch jobs

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Container Security | Application Security

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In the last few posts we’ve been looking at how batch jobs can help security, MFA for batch jobs, and the components of a batch job:

The batch jobs we will create will likely involve containers based on preliminary investigation. We’ll want to make sure we secure them properly.

I answer a lot of calls for IANS Research about Kubernetes, AKS, EKS, GKE, Docker, containers, and everything related to it. For example, how do you secure your deployment pipeline? What about secrets, encryption, and network security? What about APIs that run…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award