{"id":6476,"date":"2017-02-02T04:30:42","date_gmt":"2017-02-02T12:30:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/02\/news-305\/"},"modified":"2017-02-02T04:30:42","modified_gmt":"2017-02-02T12:30:42","slug":"news-305","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/02\/news-305\/","title":{"rendered":"5 things DevOps must do to secure containers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2017\/01\/01_intro-100706201-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Ryan Francis | Date: Wed, 01 Feb 2017 03:37:00 -0800<\/strong><\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3164769\/application-development\/5-things-devops-must-do-to-secure-containers.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<article class=\"slideshow\">\n<figure class=\"slide\"><figcaption>Can\u2019t we all get along<\/figcaption><img decoding=\"async\" data-imageid=\"100706201\" src=\"http:\/\/images.techhive.com\/images\/article\/2017\/01\/01_intro-100706201-orig.jpg\" data-thumb-src=\"http:\/\/images.techhive.com\/images\/article\/2017\/01\/01_intro-100706201-orig.jpg\" alt=\"secure containers\"\/><\/p>\n<p class=\"slideCredit\">Image by <a href=\"http:\/\/www.pixabay.com\" rel=\"nofollow\" target=\"_blank\" class=\"slideCreditLink\"><span class=\"slideCreditText\">Pixabay<\/span><\/a><\/p>\n<div class=\"slideBody\">\n<p>Do deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline \u2013 rather than graft on security checks, container monitoring and policy for access controls as an afterthought.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3164769\/application-development\/5-things-devops-must-do-to-secure-containers.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11181,11146,714],"class_list":["post-6476","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-application-development","tag-cloud-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6476"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6476\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6476"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}