10 layers of Linux container security

Containers provide an easy way to package applications and deliver them seamlessly from development to test to production. This helps ensure consistency across a variety of environments, including physical servers, virtual machines (VMs), or private or public clouds. These benefits are leading organizations to rapidly adopt containers in order to easily develop and manage the applications that add business value.

Replace affected deployments


1. The container host operating system and multi-tenancy
2. Container content (use trusted sources)
3. Container registries (secure access to container images)
4. Security and the build process
5. Control what can be deployed within a cluster
6. Container orchestration: Securing the container platform
7. Network isolation
8. Storage
9. API management, endpoint security, and single sign-on (SSO)
10. Roles and access management in a cluster federation