+
  Policy’s role in authorization, XACML today, & OpenID’s new policy charter Listen to the podcast  

CSO Online Feature: Securing Continuous Deployment for Applications in the Cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help

by Gerry Gebel

Application containers have quickly gained popularity as businesses continue to build and deploy applications in the cloud or on-premise. In fact, according to a recent study conducted by 451 Research, application containers will be a $2.7 billion market by 2020. This trend toward “containerization” is due to container simplicity, consistency, modularity and portability.

Modern businesses are utilizing application containerization to deploy and run applications both in the cloud and in on-premise data centers, without being forced to launch an entire virtual machine (VM) for every individual app. VMs do offer easy maintenance, application provisioning and simple recovery, but they are difficult to build, large, non-portable and rely on an operating system (OS) package manager, resulting in entangled apps, executables, configuration, libraries and life cycles with the host OS.

Since containers are detached from the underlying infrastructure and the host OS, they are portable on-premise and across cloud environments. In addition, because they are small and fast, they lend themselves to a continuous deployment cycle. VM’s will still play a key role as containers often run in within them, but containers provide consistency of runtime from development of testing, to production, which is a huge win for app developers and is essential for devops. However, with a single application per container, effective management of the containers is crucial.

Continue to article at CSO Online.

Samantha Berno

Media Contact

Samantha Berno
Corporate Communications Manager
Axiomatics
samantha.berno@axiomatics.com

Archived under: