(Image credit: Image Credit: Rawpixel / Shutterstock)
Containers have quickly moved from an emerging technology to an integral part of many organizations’ cloud strategies. Gartner predicts that by 2022, 75 percent of organizations will be running containerized applications in production, up from less than 30 percent today. Yet as containers have achieved widespread adoption, they’ve also caught the eyes of cybercriminals looking for another avenue to exploit.
Given the potential risk containers represent, security leaders need to create risk profiles for the types of threats and vulnerabilities they expect to experience when adopting container technology. This type of analysis is essential since the attack surface increases significantly while the level of security visibility across hosts, containers, and the infrastructure control plane decreases.