Search


Introduction

(Back)

1.1 Background

With the introduction of cloud services and the adoption of “continuous deployment” of software services, the movement of applications from one environment to another (Data Centre <-> Public Cloud) and within an environment is required to be agile and predictable. Container technology (OS virtualization) enables software to deploy quickly and run predictably when moved from one environment to another. Further, microservices are established when a set of containers work together to compose an application. While this approach improves flexibility and scalability for application development and simplifies functionality, it adds another layer of abstraction that must be secured.

1.2 Document Purpose and Scope

This document provides guidance to developers and operators when deploying applications and services using containers and microservices. It is based on GC Cloud Reference Architecture (v0.95) and is aligned with the GC Enterprise Security Architecture Program.

1.3 Audience

This document is to be used by developers, operators, business owners, project managers, system and system security practitioners leveraging containers and microservices to deliver GC services.

1.4 Document Overview

This document is structured as follows:

Section 1 identifies this document and its purpose,

Section 2 provides context, including definitions and scope

Section 3 introduces the threat environment and common attack vectors in a microservice architecture

Section 4 provides implementation recommendations to secure containers and microservices, including the hosts, orchestrators and security brokers; and

Section 5 identifies the applicable references cited in this document.

Page details

Date modified: