CA Southern Africa unmasks container security

Issue 8 2022 Infrastructure, Information Security


Craig De Lucchi.

Container security is a fairly new technology, especially when viewed in the context of the speed-of-light technology changes in the 4th industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing, but its use is spreading fast, says Craig De Lucchi, account director, CA Southern Africa.

“Let’s unpack what does containerisation mean? While definitions differ, but only slightly in the wording, all come down to the same conclusion and that is that containerisation is a form of operating system (OS) virtualisation where applications that use a shared OS run in isolated user spaces, called containers. Software containers are lightweight, standalone, executable packages of software that include everything required to run them. Containers include code, runtime, settings, system libraries and tools and can be used with both Linux and Windows-based applications. By isolating software from its surroundings, software containers enable code to run consistently, regardless of the environment in which it is operating. In short, an application container is a fully packaged and portable computing environment.”

De Lucchi confirms adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology, however, despite the inherent value they add, software containers also bring significant risks. Lack of visibility into containers means security teams are often unable to discern whether there are issues within the code. Moreover, containers are rarely scanned for vulnerabilities before or after being deployed to production.

How to secure a software container

Let’s talk to the developers in a world where security skills are no longer optional for them. There are several steps that developers can take to help secure software containers. These include enforcing the use of trusted container image repositories, eliminating image clutter by continuously monitoring what’s inside containers, and using secrets management tools to protect sensitive data. Scanning software containers for vulnerabilities is also critical.

The Gartner Security & Risk Management Summit 2022 provided a number of recommendations and added clarity by segmenting container security into three sections:

• Securing container images.

• Securing the orchestration plane.

• Securing containers at runtime.

“So, in a business landscape constantly under threat from cyberattack vectors, the real issue to focus on is security. The upside of the coin is that while the security implications appear increasingly intense, it must be noted that solutions are evolving just as fast,” concludes De Lucchi.

For more information, contact CA Southern Africa, +27 11 417 8594, [email protected], www.ca.com/za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
From the editor's desk: Can it be October already?
Technews Publishing News & Events
Welcome to the final SMART Handbook of the year. In this issue, we focus on residential estate security, from the fence to the gate and beyond. We also review our Durban SMART Estate Security Conference, ...

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
From the Editor's desk: The good, the bad, and the victims
Technews Publishing News & Events
When the Internet first arrived, everyone was expecting amazing things from it, well, everyone who knew what it was and how it worked. We had the dotcom boom and bust, and it’s fair to say that if we ...

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.