Cloud 101CircleEventsBlog
Missed CSA's Cyber Monday sale? You can still get 50% off the CCSK + CCZT Exam & Training Bundle and Token Bundle with raincheck code 'rcdoubledip24'

Download Publication

Best Practices for Implementing a Secure Application Container Architecture - Japanese Translation
Best Practices for Implementing a Secure Application Container Architecture - Japanese Translation

Best Practices for Implementing a Secure Application Container Architecture - Japanese Translation

Release Date: 02/27/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This document serves to identify recommendations and best practices to address the challenges in
securing application containers in the engineering of trustworthy secure systems through the lens of the Developer, Operator and Architect.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Microservices Architecture Pattern
Microservices Architecture Pattern
Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microse...
Best Practices for Implementing a Secure Application Container Architecture
Best Practices for Implementing a Secure Applic...
Level Up Your Cloud Security Skills With This Jam-Packed Training Bundle
Level Up Your Cloud Security Skills With This Jam-Packed Training B...
Published: 12/11/2024
Elevating Application Security Beyond “AppSec in a Box”
Elevating Application Security Beyond “AppSec in a Box”
Published: 10/02/2024
Five Levels of Vulnerability Prioritization: From Basic to Advanced
Five Levels of Vulnerability Prioritization: From Basic to Advanced
Published: 09/04/2024
Bridging the Gap: How to Ensure Seamless Collaboration Between Security & Development Teams
Bridging the Gap: How to Ensure Seamless Collaboration Between Secu...
Published: 07/08/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training