Enable javascript in your browser for better experience. Need to know to enable it? Go here.
Última actualización : Nov 20, 2019
Not on the current edition
This blip is not on the current edition of the Radar. If it was on one of the last few editions it is likely that it is still relevant. If the blip is older it might no longer be relevant and our assessment might be different today. Unfortunately, we simply don't have the bandwidth to continuously review blips from previous editions of the Radar Understand more
Nov 2019
Adoptar ? Creemos firmemente que la industria debería adoptar estos elementos. Nosotros los utilizamos cuando es apropiado para nuestros proyectos.

La adopción continua de contenedores para los despliegues, en particular Docker, ha tornado el análisis de seguridad de los contenedores en una técnica necesaria, y hemos movido esta técnica a “Adoptar” para reflejar este hecho. En particular, los contenedores introdujeron una nueva vía para los problemas de seguridad; es vital que se utilicen herramientas para analizar y revisar los contenedores durante el despliegue. Preferimos utilizar herramientas de análisis automático que corran como parte del pipeline de despliegue.

Apr 2019
Probar ? Vale la pena intentarlo. Es importante entender cómo construir esta habilidad. Las empresas deberían implementar esta tecnología en un proyecto que pueda manejar el riesgo.

The container revolution around Docker has massively reduced the friction in moving applications between environments, fueling increased adoption of continuous delivery and continuous deployments. The latter, especially, has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Tools in the build pipeline automatically check containers flowing through the pipeline against known vulnerabilities. Since our first mention of this technique, the tool landscape has matured and the technique has proven useful on development efforts with our clients.

Mar 2017
Evaluar ? Vale la pena explorarlo con el objetivo de entender cómo afectará a tu empresa.

The container revolution instigated by Docker has massively reduced the friction in moving applications between environments but at the same time has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Docker now provides its own security scanning tools, as does CoreOS, and we've also had success with the CIS Security Benchmarks. Whichever approach you take, we believe the topic of automated container security validation is of high value and a necessary part of PaaS thinking.

Nov 2016
Evaluar ? Vale la pena explorarlo con el objetivo de entender cómo afectará a tu empresa.

The container revolution instigated by Docker has massively reduced the friction in moving applications between environments but at the same time has blown a rather large hole in the traditional controls over what can go to production. The technique of container security scanning is a necessary response to this threat vector. Docker now provides its own security scanning tools, as does CoreOS, and we’ve also had success with the CIS Security Benchmarks. Whichever approach you take, we believe the topic of automated container security validation is of high value and a necessary part of PaaS thinking.

Publicado : Nov 07, 2016
Radar

Descarga el Radar Tecnológico Volumen 25

 

English | Español | Português | 中文

Radar

Mantente informada sobre Tecnología

 

Suscríbete ahora

Visita nuestro archivo para leer los volúmenes anteriores