Читать книгу Cloud Native Security - Chris Binnie - Страница 14

Оглавление

Part I Container and Orchestrator Security

The Cloud Native Computing Foundation, often abbreviated as the CNCF (www.cncf.io), reported in its 2020 survey that “the use of containers in production has increased to 92%, up from 84% last year, and up 300% from our first survey in 2016” and also that “Kubernetes use in production has increased to 83%, up from 78% last year.” The report (www.cncf.io/wp-content/uploads/2020/12/CNCF_Survey_Report_2020.pdf) takes note of a number of useful facts that demonstrate that the way modern applications are developed and hosted is continuing to evolve using Cloud Native technologies and methodologies. A significant component, as the survey demonstrates, involves containerization, and for that reason the first six chapters of this book explore the security of containers and container orchestrators. The final part of the book examines this topic using more advanced examples and scenarios.

In This Part

  Chapter 1: What Is A Container?

  Chapter 2: Rootless Runtimes

  Chapter 3: Container Runtime Protection

  Chapter 4: Forensic Logging

  Chapter 5: Kubernetes Vulnerabilities

  Chapter 6: Container Image CVEs

Cloud Native Security

Подняться наверх