Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/3248
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPerera, H. P. D. S.-
dc.contributor.authorReza, B-
dc.contributor.authorDe Silva, H. S. T.-
dc.contributor.authorKarunarathne, A. D. H. U.-
dc.contributor.authorGanegoda, B-
dc.contributor.authorSenarathne, A-
dc.date.accessioned2023-02-10T07:58:24Z-
dc.date.available2023-02-10T07:58:24Z-
dc.date.issued2022-12-26-
dc.identifier.citationH. P. D. S. Perera, B. Reza, H. S. T. De Silva, A. D. H. U. Karunarathne, B. Ganegoda and A. Senarathne, "Docker Container Security Orchestration and Posture Management Tool," 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2022, pp. 1-6, doi: 10.1109/ICCCNT54827.2022.9984287.en_US
dc.identifier.isbn978-1-6654-5262-5-
dc.identifier.urihttps://rda.sliit.lk/handle/123456789/3248-
dc.description.abstractDocker is one of the most commonly used and popular container technologies in the modern world. And attackers are also attempting to use Docker container security issues to gain a foothold in environments and break the Confidentiality, Integrity, and Availability (CIA) of the information that relies on containerized applications. Most organizations are pursuing solutions that are capable of securing Docker container workloads and visualizing the security posture of the Docker container workload, which enables higher management to make informed decisions. Before deploying a Docker container into the production environment, developers, security professionals, or anyone else working with Docker containers can use this Docker Container Security Orchestration and Posture Management tool to identify existing security configuration issues and vulnerabilities, as well as perform automated security fixing and configuring. The product’s knowledge base on Docker container best practices, vulnerabilities, and other security issues is extensive and self-updating. Using this solution, organizations with Docker workloads can reduce their attack surface and provide security posture reports that are extremely useful for IT risk-based decision making by higher management.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT);-
dc.subjectDockeren_US
dc.subjectContainer Securityen_US
dc.subjectOrchestrationen_US
dc.subjectPosture Management Toolen_US
dc.titleDocker Container Security Orchestration and Posture Management Toolen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICCCNT54827.2022.9984287en_US
Appears in Collections:Department of Computer Systems Engineering
Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
Docker_Container_Security_Orchestration_and_Posture_Management_Tool.pdf
  Until 2050-12-31
4.45 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.