Container network security guide for dummies

For Dummies style cover with whitepaper title at the top

Recent events have put the security of software supply chains squarely in the sights of corporate boardrooms while developers remain under constant pressure to deliver new software to market ever faster.

To accelerate innovation, developers often leverage open-source software (OSS) components. But the unfortunate reality is that threat actors no longer respect the unwritten code of honour in the open-source community and are now actively targeting OSS software components and public repositories. Clearly, development teams must now take proactive steps to ensure container network security.

Access this guide to learn how to:

  • Recognize attack vectors in dev environments
  • Create policies with the NetworkPolicy API
  • Leverage CNI providers
  • Run end-to-end validation tests
  • Secure Kubernetes resources
  • Control ingress traffic
  • Secure east-west communications

Provided by

VMWare logo


ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.