Why cloud-native workload security starts at the container level | Federal Information Network
New approaches to developing cloud-based applications require new approaches to securing them. Specifically, cloud-native applications typically use containerization and micro-segmentation of workloads to limit so-called east-west access of workloads. This includes communications between containers when combined into an application. This strategy contrasts with virtual machines or running code running on servers in data centers, where …