Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/3248
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Perera, H. P. D. S. | - |
dc.contributor.author | Reza, B | - |
dc.contributor.author | De Silva, H. S. T. | - |
dc.contributor.author | Karunarathne, A. D. H. U. | - |
dc.contributor.author | Ganegoda, B | - |
dc.contributor.author | Senarathne, A | - |
dc.date.accessioned | 2023-02-10T07:58:24Z | - |
dc.date.available | 2023-02-10T07:58:24Z | - |
dc.date.issued | 2022-12-26 | - |
dc.identifier.citation | H. P. D. S. Perera, B. Reza, H. S. T. De Silva, A. D. H. U. Karunarathne, B. Ganegoda and A. Senarathne, "Docker Container Security Orchestration and Posture Management Tool," 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2022, pp. 1-6, doi: 10.1109/ICCCNT54827.2022.9984287. | en_US |
dc.identifier.isbn | 978-1-6654-5262-5 | - |
dc.identifier.uri | https://rda.sliit.lk/handle/123456789/3248 | - |
dc.description.abstract | Docker is one of the most commonly used and popular container technologies in the modern world. And attackers are also attempting to use Docker container security issues to gain a foothold in environments and break the Confidentiality, Integrity, and Availability (CIA) of the information that relies on containerized applications. Most organizations are pursuing solutions that are capable of securing Docker container workloads and visualizing the security posture of the Docker container workload, which enables higher management to make informed decisions. Before deploying a Docker container into the production environment, developers, security professionals, or anyone else working with Docker containers can use this Docker Container Security Orchestration and Posture Management tool to identify existing security configuration issues and vulnerabilities, as well as perform automated security fixing and configuring. The product’s knowledge base on Docker container best practices, vulnerabilities, and other security issues is extensive and self-updating. Using this solution, organizations with Docker workloads can reduce their attack surface and provide security posture reports that are extremely useful for IT risk-based decision making by higher management. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT); | - |
dc.subject | Docker | en_US |
dc.subject | Container Security | en_US |
dc.subject | Orchestration | en_US |
dc.subject | Posture Management Tool | en_US |
dc.title | Docker Container Security Orchestration and Posture Management Tool | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICCCNT54827.2022.9984287 | en_US |
Appears in Collections: | Department of Computer Systems Engineering Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Docker_Container_Security_Orchestration_and_Posture_Management_Tool.pdf Until 2050-12-31 | 4.45 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.