Cloud 101CircleEventsBlog

Download Publication

Best Practices for Implementing a Secure Application Container Architecture
Best Practices for Implementing a Secure Application Container Architecture

Best Practices for Implementing a Secure Application Container Architecture

Release Date: 07/26/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This document serves to identify recommendations and best practices to address the challenges in securing application containers in the engineering of trustworthy secure systems through the lens of the Developer, Operator and Architect.

This publication is part of a larger series, you can find all the papers in the series here
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Business Risks Explored: Practical Insights for Resilience
Business Risks Explored: Practical Insights for Resilience
Published: 05/03/2024
Livin' on the Edge: Linux's Impact on Computing
Livin' on the Edge: Linux's Impact on Computing
Published: 05/01/2024
Navigating the Cloud – Beyond “Best Practices”
Navigating the Cloud – Beyond “Best Practices”
Published: 05/01/2024
DevSecOps Tools
DevSecOps Tools
Published: 04/26/2024

Acknowledgements

Anil Karmel
Anil Karmel
CEO, C2 Labs

Anil Karmel

CEO, C2 Labs

Anil Karmel is the Co-Founder and CEO of RegScale, which helps organizations start and stay compliant via the world's first real-time GRC platform. Formerly, Anil served as the National Nuclear Security Administration's (NNSA) Deputy Chief Technology Officer. Karmel began his government career as a Technical Staff Member of Los Alamos National Laboratory (LANL) and was responsible for inventing their cloud and collaboration technologies Kar...

Read more

Ashish Kurmi Headshot Missing
Ashish Kurmi

Ashish Kurmi

Madhav Chablani Headshot Missing
Madhav Chablani
Consulting CIO, TippingEdge Consulting

Madhav Chablani

Consulting CIO, TippingEdge Consulting

Alex Rebo Headshot Missing
Alex Rebo

Alex Rebo

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Vishwas Manral
Vishwas Manral
Founder at Precize Inc & Fellow at Cloud Security Alliance

Vishwas Manral

Founder at Precize Inc & Fellow at Cloud Security Alliance

Vishwas is the Founder at Precize Inc, a stealth Cloud and AI security startup. Vishwas is also the co-chair of CSA’s Serverless Working Group and the Chair of Cloud Security Alliance in Silicon Valley. He was the head of Cloud Native security and Chief Technologist at McAfee Enterprise + FireEye. Vishwas joined McAfee Enterprise when his com...

Read more

John Wrobel Headshot Missing
John Wrobel

John Wrobel

Ramaswamy Chandramouli Headshot Missing
Ramaswamy Chandramouli

Ramaswamy Chandramouli

Michael Green Headshot Missing
Michael Green

Michael Green

Cem Gurkok Headshot Missing
Cem Gurkok

Cem Gurkok

Jeff Barnes Headshot Missing
Jeff Barnes

Jeff Barnes

Joshua Cuellar Headshot Missing
Joshua Cuellar

Joshua Cuellar

Joshua Daniel Headshot Missing
Joshua Daniel

Joshua Daniel

Shyamkant Dhamke Headshot Missing
Shyamkant Dhamke

Shyamkant Dhamke

Yin Lee Headshot Missing
Yin Lee

Yin Lee

James McCloskey Headshot Missing
James McCloskey

James McCloskey

Ki-Hong Min Headshot Missing
Ki-Hong Min

Ki-Hong Min

Ed Santiago Headshot Missing
Ed Santiago

Ed Santiago

David Wayland Headshot Missing
David Wayland

David Wayland

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Juanita Koilpillai
Juanita Koilpillai
Pioneer of Software Defined Perimeter

Juanita Koilpillai

Pioneer of Software Defined Perimeter

Juanita Koilpillai was Founder and CEO of Waverley Labs, a pioneer in software defined perimeters (SDP) and digital risk reduction solutions. She had 30 years’ experience researching and developing systems in computer security, network management and real-time distributed software. She led the open source software-defined perimeter (SDP) effort for ‘black’ apps in the cl...

Read more

Marina Bregkou
Marina Bregkou
Senior Research Analyst, CSA EMEA

Marina Bregkou

Senior Research Analyst, CSA EMEA

Michaela Iorga
Michaela Iorga
Senior Security Technical Lead for Cloud Computing at National Institute of Standards and Technology (NIST/ITL)

Michaela Iorga

Senior Security Technical Lead for Cloud Computing at National Institute of Standards and Technology (NIST/ITL)

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

Michele Drgon Headshot Missing
Michele Drgon

Michele Drgon

John Kinsella Headshot Missing
John Kinsella

John Kinsella

Dr. Vrettos Moulos
Dr. Vrettos Moulos

Dr. Vrettos Moulos

Dr. Vrettos Moulos is a senior research software engineer in Institute of Communication and Computer Systems in Greece. He holds a PhD in secure microservice architecture patterns from the School of Electrical and Computer Engineering of the National Technical University of Athens (NTUA).

He has been a member, for more than 10 years, of software development teams creating mission critical applications (rule-based decision systems, sec...

Read more

Andrew Wild
Andrew Wild

Andrew Wild

Atul Chaturvedi Headshot Missing
Atul Chaturvedi

Atul Chaturvedi

Frank Geck Headshot Missing
Frank Geck

Frank Geck

Amir Jerbi Headshot Missing
Amir Jerbi

Amir Jerbi

Aaron Lippold Headshot Missing
Aaron Lippold

Aaron Lippold

Lloyd Osafo Headshot Missing
Lloyd Osafo

Lloyd Osafo

Mark Potter Headshot Missing
Mark Potter

Mark Potter

Kina Shah Headshot Missing
Kina Shah

Kina Shah

Shankar Subramaniyan Headshot Missing
Shankar Subramaniyan

Shankar Subramaniyan

Ken Stavinoha Headshot Missing
Ken Stavinoha

Ken Stavinoha

Shanthi Thomas Headshot Missing
Shanthi Thomas

Shanthi Thomas

Ed Santiago Headshot Missing
Ed Santiago

Ed Santiago

Shawn Wells Headshot Missing
Shawn Wells

Shawn Wells

John Osborne Headshot Missing
John Osborne

John Osborne

James Yaple Headshot Missing
James Yaple

James Yaple

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training