Date: March, 23, 2022
Start Time: 5:00 pm GMT
End Time: 6:00 pm GMT
Location: Virtual/Online
Price: Free
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host.
Key takeaways
- Understand the impact your container hosting strategy will have on your security requirements
- Learn some critical security best practices for the different container architectural building blocks, including Amazon ECS, Amazon EKS and AWS Fargate
- Get insights into the key risks you’ll face with vital hints and tips to keep your containers secure