Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » What Are Containerized Applications and How Should They Be Secured?
Cybersecurity

What Are Containerized Applications and How Should They Be Secured?

Chris HughesBy Chris HughesMay 10, 20223 Mins Read
Facebook Twitter LinkedIn Email
Containers
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The industry push for cloud adoption is only accelerating and with the changing landscape in terms of how compute workloads are deployed and run. While the cloud offers several options, none have seemed to take the industry by storm quite like containers.

The global application container market is expected to grow to nearly $5 billion by 2023. Studies by organizations, such as Forrester, show that up to 86% of IT leaders plan to adopt containers for application deployments. Additionally, 65% also plan to utilize container management platforms to manage those workloads.

All of that said, many organizations and tech leaders still don’t fully understand containerized applications, container orchestration, and container security. We will take a high-level look at those topics in this article.

What Are Containers?

To put it simply, a container is essentially a package that includes application code and all of the required dependencies so that applications can run across various computing environments. Unlike virtual machines (VM), containers virtualize the operating system as well. Containers operate on the same machine by sharing an OS kernel but provide logical isolation through process isolation.

Containers tend to be much more lightweight than VMs and therefore more efficient, as well as more portable. Unlike VMs, each container doesn’t need its own OS either. Also, containers are typically megabytes in size, versus gigabytes.

These benefits make it fairly evident why organizations are increasingly utilizing containers to run their applications, especially in cloud-native ecosystems, where workloads can be moved within, and even across, cloud service providers (CSPs).

Container Orchestration

To maximize the value of containerized applications, organizations are increasingly turning to Container Orchestration options. Container orchestration handles much of the operational overhead of managing containers, such as scheduling, scaling, and monitoring.

The most notable Container Orchestration option is Kubernetes, easily being the most adopted option in the market and growing. Kubernetes is an open-source project, now managed by the Cloud Native Computing Foundation.

Securing Containers

Containers aren’t without their own security concerns though either. Containers suffer from the same security concerns we see in other compute abstractions, such as malware, insecure privileges, sensitive data exposure, and more.

Organizations adopting containers need to take advantage of existing best practices and guidance around securing containers. This includes during the build process, when stored in registries, and also in a runtime production environment as well.

Further, companies should adopt and evolve existing security processes and tooling to account for these new concerns as part of any cloud-native and container adoption strategy. This includes not just processes and tooling but also upskilling their existing workforce, hiring for new competencies, and finding trusted partners to ensure their container adoption initiatives aren’t stifled by undue risk and vulnerabilities.

There are some excellent resources for organizations to brush up on container security, such as NIST’s Application Container Security Guide or CNCF’s Cloud-native Security Best Practices whitepaper.

Closing Thoughts

All of this said it is clear why organizations are increasingly adopting containers to deploy their applications but also evident that security must be a conscious part of that transformation and shift as well.

Malicious actors ultimately go to where the sensitive data and value are and application containers are a new attack vector that they certainly have and will continue to take advantage of. Much like any technology transformation or shift, security needs to be a key consideration. Luckily, there is plenty of guidance and tooling to help organizations secure their containerized workloads and mitigate risk.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025

Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

June 24, 2025

AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration
  • AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’
  • Larry Ellison Declares Oracle Will Be #1 in Cloud Databases, Apps, and AI Data Centers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.