From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Specify security requirements for containers
From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Specify security requirements for containers
Container security in Azure can be achieved by integrating with other services. For example, container images can be scanned for vulnerabilities if they're stored in the Azure Container Registry. Any secrets that the container image might need should be stored in Azure Key vault. The container can then use a managed identity to authenticate to the key vault and retrieve the secrets when necessary. You should also look at configuring runtime protection for clusters after they're deployed.
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives33s
-
(Locked)
Specify security baselines for IaaS57s
-
(Locked)
Specify security baselines for PaaS45s
-
(Locked)
Specify security baselines for SaaS34s
-
(Locked)
Specify security baselines for IoT1m 5s
-
(Locked)
Specify security requirements for data workloads4m 22s
-
(Locked)
Specify security requirements for web workloads54s
-
(Locked)
Specify security requirements for storage2m 42s
-
(Locked)
Specify security requirements for containers40s
-
(Locked)
Specify security requirements for container orchestration32s
-
(Locked)
-
-
-