Workload Security

Securing the Container Lifecycle from Build to Run

New application development and modernization efforts are driving increased container adoption at a rapid pace. Experts predict that more than 85 percent of global organizations will be running containerized applications in production in the next few years. While there are many benefits to adopting containers and Kubernetes it also presents some challenges.   

The rise of containerized microservices combined with the ephemeral nature of containers has resulted in exponential growth of the attack surface, and attackers are taking note. Additionally, the use of public image registries has become commonplace. These additional entry points and rapidly expanding attack surfaces are just the sort of low-hanging fruit that attackers crave. Threat actors and cybercriminals are now creating attacks specifically targeting Kubernetes and container vulnerabilities.  

So how do you effectively defend against these new attack vectors and secure your infrastructure?  

We spoke with Johan Marais, Senior Platform Services Manager at Discovery Ltd. Their usage of VMware Carbon Black and Tanzu has helped them focus on three key areas to secure their infrastructure: 

  • Platform visibility  
  • Enforcement of guardrails and remediation  
  • Alerting and notifications  

Understanding that they could no longer secure at just the container layer, Discovery Ltd. with the help of Carbon Black and Tanzu moved to successfully secure the infrastructure layer and the Kubernetes layer their workload is running on. 


These are just some of the highlights from our recent webinar. To gain more insight into how Discovery Ltd. is accelerating app delivery with consistent security across environments through their partnership with VMware, watch the webinar Securing the Container Lifecycle from Build to Run that will be available on-demand Wednesday, March 23rd 

Related Resources:

Shifting Security Left and Protecting Right – Operationalizing DevSecOps – eBook