{"id":6970,"date":"2023-03-19T19:54:57","date_gmt":"2023-03-19T19:54:57","guid":{"rendered":"https:\/\/khaleej-trend.online\/eng\/?p=6970"},"modified":"2023-03-19T19:54:57","modified_gmt":"2023-03-19T19:54:57","slug":"microservices-and-containers-security-holes-in-the-racket","status":"publish","type":"post","link":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/","title":{"rendered":"Microservices and containers security holes in the racket"},"content":{"rendered":"<div id=\"khale-4268780811\" class=\"khale-- khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><div id=\"khale-2149969940\" class=\"khale-before-content khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p><span style=\"vertical-align: inherit;\">Microservices and containers security holes in the racket, Today&#8217;s software is a mosaic: different services and features are responsible for offering different capabilities. To make this complex software flexible and flexible, development companies often use microservices and containers. In a survey conducted by Statista in 2021, 34% of respondents said they had adopted microservices, and 37% stated that they had partially used microservices, proving the popularity of this development approach.<\/span><\/p><div id=\"khale-2904998801\" class=\"khale-- khale-entity-placement\" style=\"margin-left: auto;margin-right: auto;text-align: center;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<h2><span style=\"vertical-align: inherit;\">Security eyelets for delicate services and containers in the paddle<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Although the microservices approach has many benefits including ease of scaling and management, it also hides some security concerns, such as potential vulnerabilities and connectivity risks. Knowing the expected cyber security risks and how to address them before starting the development process will help you create a reliable and secure product.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">In this article, we note the security challenges in container-based architectures and microservices that may arise when developing applications. We also offer 11 mini-services and container security best practices. This article will be useful for those who want to efficiently improve the security of their products and those who are new to containers and microservices.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">What are containers and microservices? | Microservices and containers security holes in the racket<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Containers and microservices are popular approaches to application development, especially for complex solutions. <\/span><em><span style=\"vertical-align: inherit;\">O&#8217;Reilly&#8217;s Microservices Adoption Report<\/span><\/em><span style=\"vertical-align: inherit;\"> 2020 \u00a0shows that 77% of respondents have adopted microservices, with 92% having success with this approach. Moreover, respondents who used containers to deploy microservices were more likely to report success than those who did not.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Before we discuss how security is implemented in microservices and containers, let&#8217;s explore what exactly these approaches are and what benefits they bring to the application development process.<\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\">A container<\/span><\/strong><span style=\"vertical-align: inherit;\"> \u00a0is a form of virtualization that enables you to run applications in isolated spaces called containers that use the same common operating system (OS). While virtualization allows multiple operating systems to run on a single physical server hardware, containerization allows you to deploy multiple applications using the same operating system on a single virtual machine or server.<\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\">Containers<\/span><\/strong><span style=\"vertical-align: inherit;\"> , also known as application containers or server application containers, are executable units of software that contain application code along with its libraries and dependencies. According to the National Institute of Standards and Technology (NIST), the fact that application containers are isolated from each other but still share the resources of the underlying operating system makes it easier for developers to efficiently scale applications across the cloud.<\/span><\/p>\n<p><a href=\"https:\/\/khaleej-trend.online\/eng\/is-transcend-shop-legit-or-scam-transcends-shop-review\/\">Is Transcend Shop Legit Or Scam ,transcends shop review<\/a><\/p>\n<h3><span style=\"vertical-align: inherit;\">Fit micro-service and container safety eyelets into the paddle<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">A microservices architecture, or simply microservices, is an architectural approach to application development in which a single application consists of many independent microservices.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Microservices are self-deployable, allowing you to improve application code, add new features, and scale each service much more easily than with a monolithic architecture. With microservices, you can update an existing service without rebuilding and redistributing the entire application.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Each service represents a separate database, so it can be managed by a small development team. The microservices architecture simplifies the creation and maintenance of complex applications, but it is not suitable for small applications.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Microservices are loosely coupled, so if one service fails, the rest continue to run. Improved fault tolerance for the entire application. Moreover, it supports multilingual programming, which means that services do not need to share the same technology stack, libraries, or frameworks. Microservices and containers security holes in the racket<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">You can use containers and microservices separately or together. Because in this article we are discussing security practices for developing applications that use both approaches. Let&#8217;s briefly explore how containers and microservices can be combined.<\/span><\/p>\n<h3><span style=\"vertical-align: inherit;\">last | Microservices and containers security holes in the racket<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">In simple terms, a container encapsulates a lightweight runtime environment for an application. So when a microservice is developed inside a container. It inherits container benefits such as portability, scalability, and additional layers of security. Containers provide isolation for each containerized application or microservice. Thus, they reduce the risk of spreading security vulnerabilities.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">By running microservices in separate containers, you can deploy them independently. Regardless of the language in which each microservice is written. In this way, containerization removes the risk of any friction or conflict between languages, libraries, and frameworks.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">In terms of service discovery, containerization makes it easy to locate and communicate with microservices. with each other, as they all run in containers that are on the same platform. For the same reason, it is also easier for developers to organize microservices.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Despite all the advantages, both containers and microservices have their own nuances and challenges. Including cyber security matters. Let&#8217;s discuss some of the most important security concerns.<\/span><\/p>\n<h2 id=\"microservices-security-challenges\"><span style=\"vertical-align: inherit;\">Top 5 security challenges for microservices | Microservices and containers security holes in the racket<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">The diagram below shows how a simple microservices architecture includes multiple components, each with vulnerabilities and security risks. Let&#8217;s review the top 5 challenges of microservices that make it difficult to secure modern applications.<\/span><\/p>\n<p><a href=\"https:\/\/khaleej-trend.online\/eng\/best-more-detailed-review-of-trade-nation-forex-broker-2023-2\/\">Best more detailed review of trade nation forex broker 2023<\/a><\/p>\n<h3 id=\"infrastructure-design\"><span style=\"vertical-align: inherit;\">1. Design infrastructure and multi-cloud deployments<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Microservices are distributed to multiple data centers, cloud service providers, and hosts.\u00a0<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Building infrastructure across multiple clouds increases the risk of losing control and visibility of application components.<\/span><\/p>\n<h3 id=\"segmentation-isolation\"><span style=\"vertical-align: inherit;\">2. Division and isolation<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Separate application components do their job in interdependence with many other services.\u00a0<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">All of these components create and maintain communication channels across different infrastructure layers, so communication across services is often skipped when testing for security vulnerabilities, and as a result is significant exposure in the interfaces between these services.<\/span><\/p>\n<h3 id=\"identity-management\"><span style=\"vertical-align: inherit;\">3. Identity management and access control<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Microservices expose new entry points for both internal and external actors.\u00a0<\/span><span style=\"vertical-align: inherit;\">Access controls must be regulated for all entities, whether legitimate or illegitimate.<\/span><\/p>\n<p><a href=\"https:\/\/khaleej-trend.online\/eng\/security-email-system-unbmeta-online\/\">Security email system unbmeta.online<\/a><\/p>\n<p><span style=\"vertical-align: inherit;\">It&#8217;s important to have an administrative interface that can help you manage users, applications, groups, devices, and APIs from one central location, giving you real-time visibility into what&#8217;s going on in your environment.<\/span><\/p>\n<h3 id=\"data-management\"><span style=\"vertical-align: inherit;\">4. Data management<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">The data that is created in a microservices architecture is constantly moving, changing, and interacting with it. However, data is also stored in different places and for different purposes. Data asset owners need insight into the life cycle and dynamics of data to avoid breaches.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Can you be sure that <\/span><strong><span style=\"vertical-align: inherit;\">\u00a0your data is safe?<\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\">Data leaks can occur regardless of the exposure of the communication channel. Malicious actors can connect vulnerabilities to infiltrate private assets.<\/span><\/p>\n<h3 id=\"rapid-app-changes\"><span style=\"vertical-align: inherit;\">5. Rapid application rate changes<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Developing applications in modern SDLC forces the code base and data stores to grow over time. Development methodologies drive iterative and incremental development, putting microservices under constant workload.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">How do you ever know that new code coming through the development pipeline will not expose your application to new combinations of vulnerabilities and dangerous attack vectors?<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Security testing must keep up with the pace of SDLC, to improve DevSecOps.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Decomposing applications into microservices increases the attack surface of the application due to newly added entry points and inter-instance connections now spread across many environments, since microservices security requires non-simple, out-of-the-box solutions.<\/span><\/p>\n<h1 id=\"b7c1\" class=\"je jf gx bd jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka kb bi\" data-selectable-paragraph=\"\"><span style=\"vertical-align: inherit;\">Security challenges for microservices and containers<\/span><\/h1>\n<p id=\"b1bf\" class=\"pw-post-body-paragraph if ig gx ih b ii kc ik il im kd io ip iq ke is it iu kf iw ix iy kg ja jb jc gq bi\" data-selectable-paragraph=\"\"><em class=\"kh\"><span style=\"vertical-align: inherit;\">Security concerns about microservices<\/span><\/em><span style=\"vertical-align: inherit;\"> \u00a0typically stem from the following:<\/span><\/p>\n<ul class=\"\">\n<li id=\"5e69\" class=\"ki kj gx ih b ii ij im in iq kk iu kl iy km jc kn ko kp kq bi\" data-selectable-paragraph=\"\"><strong class=\"ih gy\"><span style=\"vertical-align: inherit;\">Many moving parts microservice-based applications are<\/span><br \/>\n<\/strong><span style=\"vertical-align: inherit;\"> more complex than monolithic applications. Because it consists of many moving parts. One application can contain hundreds of microservices. It is deployed in thousands of containers. For developers, this means that homogeneous code containing 1000 DLLs must be parsed. The same number of microservices. While this makes the code more secure and maintainable. It also makes the microservices-based application more vulnerable to cyberattacks. Microservices and containers security holes in the racket<\/span><\/li>\n<li id=\"7e6b\" class=\"ki kj gx ih b ii kr im ks iq kt iu ku iy kv jc kn ko kp kq bi\" data-selectable-paragraph=\"\"><strong class=\"ih gy\"><span style=\"vertical-align: inherit;\">Communication risks<\/span><br \/>\n<\/strong><span style=\"vertical-align: inherit;\"> In addition, the interface-driven development approach requires well-defined REST APIs to ensure that microservices can establish consistent communication with each other. Unlike monolithic applications where components communicate internally, components of microservices-based applications communicate in both external and internal environments, which creates speed and security challenges. Developers need to be more security-conscious, as they have to ensure that many things are protected than monolithic applications, ensure communication security, and protect a much larger attack surface.<\/span><\/li>\n<\/ul>\n<p id=\"4862\" class=\"pw-post-body-paragraph if ig gx ih b ii ij ik il im in io ip iq ir is it iu iv iw ix iy iz ja jb jc gq bi\" data-selectable-paragraph=\"\"><span style=\"vertical-align: inherit;\">For\u00a0 <\/span><em class=\"kh\"><span style=\"vertical-align: inherit;\">container security challenges<\/span><\/em><span style=\"vertical-align: inherit;\"> , there are a wide range of issues as security must be maintained across all operations.<\/span><\/p>\n<ul class=\"\">\n<li id=\"c637\" class=\"ki kj gx ih b ii ij im in iq kk iu kl iy km jc kn ko kp kq bi\" data-selectable-paragraph=\"\"><strong class=\"ih gy\"><span style=\"vertical-align: inherit;\">Vulnerabilities in container technology<\/span><br \/>\n<\/strong><span style=\"vertical-align: inherit;\"> The core components of container technology\u2014containers, images, registries, marshals, and the host operating system\u2014can also be targeted by cybercriminals. For example, attackers can compromise an image and gain access to an application&#8217;s files or data. Furthermore, hackers can infect a container with malicious code and use it to attack other containers, the host operating system, or other hosts.<\/span><\/li>\n<li id=\"16fb\" class=\"ki kj gx ih b ii kr im ks iq kt iu ku iy kv jc kn ko kp kq bi\" data-selectable-paragraph=\"\"><strong class=\"ih gy\"><span style=\"vertical-align: inherit;\">More people have access to the code<\/span><br \/>\n<\/strong><span style=\"vertical-align: inherit;\"> While DevSecOps aims to break down barriers between teams and ensure continuous integration and continuous deployment (CI\/CD), it also increases the risk that one code can change in a distributed environment.<\/span><\/li>\n<\/ul>\n<h3><span style=\"vertical-align: inherit;\">Precision serve and containers created security holes in the putter<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Developers prefer to use a container-based architecture because containers are lightweight. Portable, easy to maintain and expand. Thanks to these qualities, containers can be used for modern development approaches such as. DevOps, Serverless, and microservices. Also, developers can precisely control how many resources each container can use. Optimize CPU and memory usage of physical devices. Microservices and containers security holes in the racket<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Agile developments encourage the use of innovative technologies such as containers and microservices. Very practical, however, it requires special attention in terms of cyber security.<\/span><\/p>\n<p><a href=\"https:\/\/khaleej-trend.online\/eng\/the-2020-security-cybermatines-are-back-in-digital-version-comptr-shriekyblog\/\">The 2020 security cybermatines are back in digital version comptr shriekyblog<\/a><\/p>\n<div>\n<p><span style=\"vertical-align: inherit;\">Agile approaches of the DevSecOps type aim to augment regular developments, facilitated by technologies such as containerization and the use of the cloud. However, security, which is a complex thing for developers to manage in this new context, is a drag on the pace of development. According to a study by Dynatrace, screening alerts (often false positives) is particularly harmful.<\/span><\/p>\n<h3><span style=\"vertical-align: inherit;\">last | Microservices and containers security holes in the racket<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">On average, according to this study, an organization must process 2,169 new application security alerts per month, most of which, according to 77% of CISO, are false positives. As a result, 68% of CISOs say the volume of alerts makes it very difficult to prioritize vulnerabilities based on risk and impact level. In fact, 63% of CISOs believe that DevOps and agile methods have made finding and managing software vulnerabilities more difficult.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">At the development level, the proliferation of alerts is a real problem. Thus, according to 64% of CISOs, developers do not always have time to fix vulnerabilities before putting code into production. Worse: 28% of CISOs fear that developers bypass vulnerability detection tools to speed up software delivery. Logically, 74% of CISOs consider that traditional security controls, such as vulnerability scanners, are no longer relevant in today&#8217;s cloud world.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">Blind spots in application security<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">For 89% of CISOs, microservices, containers, and Kubernetes have created application security blind spots. 97% of organizations lack real-time visibility of runtime vulnerabilities in containerized production environments. As a result, 71% of CISOs admit that they are not completely sure. That the code is free of vulnerabilities before it is pushed into production. However, there is a solution within the DevSecOps approach: automating deployments. And configurations include code management, especially in cloud-like environments, according to 77% of CISOs.<\/span><\/p>\n<aside class=\"encadre mb-small\">\n<h3><span style=\"vertical-align: inherit;\">about studying<\/span><\/h3>\n<p><span style=\"vertical-align: inherit;\">Accurate and automated assessment of risks and impacts is fundamental to DevSecOps. The study was conducted by Dynatrace in 2021. It is based on a survey it conducted. Coleman Parkes has ordered Dynatrace from 700 large corporate CISOs. With more than 1,000 employees, that&#8217;s 200 participants in the United States. and 100 in the United Kingdom, France, Germany and Spain as well as 50 in Brazil and Mexico.<\/span><\/p>\n<\/aside>\n<\/div>\n<div id=\"khale-4279063090\" class=\"khale-after-content khale-entity-placement\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"autorelaxed\"\r\n     data-ad-client=\"ca-pub-9610686647069611\"\r\n     data-ad-slot=\"3780750108\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>","protected":false},"excerpt":{"rendered":"<p>Microservices and containers security holes in the racket, Today&#8217;s software is a mosaic: different services and features are responsible for offering different capabilities. To make this complex software flexible and flexible, development companies often use microservices and containers. In a survey conducted by Statista in 2021, 34% of respondents said they had adopted microservices, and &hellip;<\/p>\n","protected":false},"author":14,"featured_media":6975,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[10097],"class_list":["post-6970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apps","tag-microservices-and-containers-security-holes-in-the-racket"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microservices and containers security holes in the racket - kworld trend<\/title>\n<meta name=\"description\" content=\"Microservices and containers security holes in the racket, Today&#039;s software is a mosaic: different services and features are responsible\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microservices and containers security holes in the racket - kworld trend\" \/>\n<meta property=\"og:description\" content=\"Microservices and containers security holes in the racket, Today&#039;s software is a mosaic: different services and features are responsible\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/\" \/>\n<meta property=\"og:site_name\" content=\"kworld trend\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-19T19:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"fady2023\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"fady2023\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/\"},\"author\":{\"name\":\"fady2023\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\"},\"headline\":\"Microservices and containers security holes in the racket\",\"datePublished\":\"2023-03-19T19:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/\"},\"wordCount\":1919,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Microservices-and-containers-security-holes-in-the-racket.png\",\"keywords\":[\"Microservices and containers security holes in the racket\"],\"articleSection\":[\"Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/\",\"name\":\"Microservices and containers security holes in the racket - kworld trend\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Microservices-and-containers-security-holes-in-the-racket.png\",\"datePublished\":\"2023-03-19T19:54:57+00:00\",\"description\":\"Microservices and containers security holes in the racket, Today's software is a mosaic: different services and features are responsible\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#primaryimage\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Microservices-and-containers-security-holes-in-the-racket.png\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Microservices-and-containers-security-holes-in-the-racket.png\",\"width\":1200,\"height\":630,\"caption\":\"Microservices and containers security holes in the racket\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/microservices-and-containers-security-holes-in-the-racket\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microservices and containers security holes in the racket\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\",\"name\":\"kworld trend\",\"description\":\"site care about apps and trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\",\"name\":\"hasadwan2020\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"width\":512,\"height\":512,\"caption\":\"hasadwan2020\"},\"logo\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\"},\"sameAs\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\",\"name\":\"fady2023\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"caption\":\"fady2023\"},\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/author\\\/fady2023\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microservices and containers security holes in the racket - kworld trend","description":"Microservices and containers security holes in the racket, Today's software is a mosaic: different services and features are responsible","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/","og_locale":"en_US","og_type":"article","og_title":"Microservices and containers security holes in the racket - kworld trend","og_description":"Microservices and containers security holes in the racket, Today's software is a mosaic: different services and features are responsible","og_url":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/","og_site_name":"kworld trend","article_published_time":"2023-03-19T19:54:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png","type":"image\/png"}],"author":"fady2023","twitter_card":"summary_large_image","twitter_misc":{"Written by":"fady2023","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#article","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/"},"author":{"name":"fady2023","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa"},"headline":"Microservices and containers security holes in the racket","datePublished":"2023-03-19T19:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/"},"wordCount":1919,"commentCount":1,"publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png","keywords":["Microservices and containers security holes in the racket"],"articleSection":["Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/","url":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/","name":"Microservices and containers security holes in the racket - kworld trend","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#primaryimage"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png","datePublished":"2023-03-19T19:54:57+00:00","description":"Microservices and containers security holes in the racket, Today's software is a mosaic: different services and features are responsible","breadcrumb":{"@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#primaryimage","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/03\/Microservices-and-containers-security-holes-in-the-racket.png","width":1200,"height":630,"caption":"Microservices and containers security holes in the racket"},{"@type":"BreadcrumbList","@id":"https:\/\/khaleej-trend.online\/eng\/microservices-and-containers-security-holes-in-the-racket\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/khaleej-trend.online\/eng\/"},{"@type":"ListItem","position":2,"name":"Microservices and containers security holes in the racket"}]},{"@type":"WebSite","@id":"https:\/\/khaleej-trend.online\/eng\/#website","url":"https:\/\/khaleej-trend.online\/eng\/","name":"kworld trend","description":"site care about apps and trends","publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/khaleej-trend.online\/eng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c","name":"hasadwan2020","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","width":512,"height":512,"caption":"hasadwan2020"},"logo":{"@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg"},"sameAs":["https:\/\/khaleej-trend.online\/eng"]},{"@type":"Person","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa","name":"fady2023","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","caption":"fady2023"},"url":"https:\/\/khaleej-trend.online\/eng\/author\/fady2023\/"}]}},"_links":{"self":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/6970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/comments?post=6970"}],"version-history":[{"count":1,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/6970\/revisions"}],"predecessor-version":[{"id":6976,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/6970\/revisions\/6976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media\/6975"}],"wp:attachment":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media?parent=6970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/categories?post=6970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/tags?post=6970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}