Effective Security Protocols for Containerized Applications

Effective Security Protocols for Containerized Applications

Authors

  • Imam Nugroho Department of Computer Science, Universitas Diponegoro
  • Siti Marlina Department of Computer Science, Universitas Padjadjaran

Keywords:

Container security, Docker, Kubernetes, Container isolation, Image security

Abstract

Containerized applications have transformed the deployment and scalability of software systems, enabling faster development cycles and more efficient resource utilization. However, this transformation has introduced new security challenges that must be addressed to protect sensitive data and maintain system integrity. This paper explores effective security protocols for containerized applications, focusing on best practices and emerging technologies that enhance security in container environments. Topics include container isolation, image security, runtime protection, network security, and monitoring. The paper also examines case studies to highlight real-world applications of these protocols, providing actionable insights for organizations aiming to secure their containerized environments against a wide range of threats.

Author Biographies

Imam Nugroho, Department of Computer Science, Universitas Diponegoro

 

 

 

Siti Marlina, Department of Computer Science, Universitas Padjadjaran

 

 

Downloads

Published

2024-07-25

How to Cite

Imam Nugroho, & Siti Marlina. (2024). Effective Security Protocols for Containerized Applications. Eigenpub Review of Science and Technology, 8(7), 114–132. Retrieved from https://studies.eigenpub.com/index.php/erst/article/view/83
Loading...