View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
November 21, 2014

Do you know what’s inside your container?

Red Hat urges CIOs to pay attention to key security concerns.

By CBR Staff Writer

CIOs looking to make the most of innovative enterprise-grade containers must pay attention to crucial security concerns.

That is the latest advice from technology specialist Red Hat, which says – if implemented correctly – containerisation offers many businesses benefits, including extreme application portability, flexibility, and rapid application delivery.

Red Hat refers to containers as the "latest hot technology in IT", which offers organisations the ability to isolate and run applications in their own environment with just the necessary operating system components.

While the innovative approach provides many potential upsides, enterprises are not necessarily rushing to adopt containers, with Red Hat suggesting many businesses are put off by key security concerns.

Improperly implemented or even malicious containers can cause real damage, just like an improper or malicious application.

As a result, Red Hat reports in a blog statement that: "Containers must also operate within the security and certification ecosystem that covers applications today."

The statement says enterprises must be able to clearly identify where a container originated, and what components are packaged in the container.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Containers, suggests Red Hat, will have a lifecycle that must be managed: "We want IT organizations to be able to verify that a container originated at a trusted, verified source, to track that container as it is deployed across all manner of platforms, and to be confident that the container will receive the support and updates required throughout its lifecycle."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.