This resource is no longer available
58% of developers report that their companies use or plan to use containers in the next 12 months.
Despite their smaller footprint and attack surface, containerized environments are still susceptible to malicious attacks between containers or within the shared resources of the underlying host.
But setting up container security isn’t as mysterious as you may think. Leverage this AWS white paper to learn 8 secrets to securing containers.