In September 2017, the National Institute of Standards and Technology issued a 63-page paper detailing its recommendations for container security. While the report is chock-full of recommendations all cloud-native users should implement, it’s not a text most people will actually read.
Elsie Phillips and Paul Burt share key takeaways from the NIST container security standard report, including the importance of using container-specific host OSes and using tooling specific to containers to monitor for vulnerabilities, and offer suggestions for how to implement them within an organization.
Elsie Phillips is a product marketing manager at CoreOS, where she herds the CoreOS community and coleads the Kubernetes Contributor Experience SIG. She’s a Northwest native who got her start in open source working at the Oregon State University Open Source Lab. In her free time, she throws wild one-woman dance parties and makes a mean vegan chocolate chip cookie.
Paul Burt is a community manager at CoreOS. He’s also the one upvoting your /r/kubernetes threads and answering your #coreos questions on freenode. Paul has a knack for demystifying infrastructure and making gnarly, complex topics approachable. He enjoys home-brewing beer, reading independent comics, and yelling at his computer when it doesn’t do what he wants.
©2018, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • email@example.com