{"id":1151,"date":"2019-09-11T00:12:45","date_gmt":"2019-09-10T18:42:45","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/in\/?p=1151"},"modified":"2021-09-29T22:43:43","modified_gmt":"2021-09-29T17:13:43","slug":"8-best-practices-for-securing-microservices-and-containers","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/","title":{"rendered":"8 Best Practices For Securing Microservices And Containers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Swift deployment and increased independence of services have made microservices which is made popular amongst the developers, convenient and approachable for organizations.\u00a0 However, transferring from a monolithic architecture to a microservices architecture fosters many issues, among which security affairs are the most significant ones to consider. Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade. Manipulating containers as a unit of service diminishes the transparency of the applications and their ability to audit. Introducing security to applications without dropping the benefits of a microservice approach can be challenging. Always take security measures for all the components encompassing the container technology. Containers, registers, orchestrators, and the host OS needs firm security coverage.\u00a0 We studied the crucial security challenges faced while adopting microservices and here we are listing out the industry best practices to ensure security in microservices and containers.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Immutable containers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Attackers often exploit the shell access given to images to inject malicious code. This can be avoided by creating immutable containers. Precise immutability implies that the container could be destroyed, which cannot befall if the microservices are inside the container. By creating immutable containers faulty containers can be removed instead of being fixed or upgraded. When enhancing the identity of a service always leverage vulnerability data from the container image scans.\u00a0\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Run Images\u00a0 from Trustworthy Sources<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Always build a trusted image repository and run images only from this repository. Developers should monitor application signatures in their scripts before putting containers into production. When running across multiple cloud environments, make use of a trustworthy scanning tool.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Microservice Deployment<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Deploy one microservice per host. Grouping containers of a\u00a0 certain microservice on a single host operating system kernel will help in providing additional defense to the system so that the intruders might face obstacles in compromising various groups. Automating this process may help for environments with a lot of hosts.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Enhance Security of The Host Operating System<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Container-specific host operating systems are free from undesirable functionalities so they have a much more diminutive attack surface than the other general-purpose hosts. NIST recommends such OS for microservices and always for a platform that allows regulating egress traffic amidst a router or firewall. Following\u00a0 CIS <strong><a href=\"https:\/\/www.urolime.com\/docker-consulting.html\">Docker<\/a><\/strong> Benchmark list of checks can help with hardening the system.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">5. Follow The Defence In Depth Approach<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It involves security measures such as refining communication flows, using encryption and authenticating and authorizing access to microservices. Defending the internal environment from any outside connections is the initial layer of defense.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">6. Container-native Monitoring Tools<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Security Scanner or other specially designed tools are commonly used to detect the potential threats of applications.\u00a0 Such tools can detect the malware and other known vulnerabilities whereas a monitoring tool detects unexpected problems. Monitoring tools will have a predefined security policy to which every collected event are examined.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">7. Use orchestration managers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Orchestrators give you access to handle clusters of containers, separate workloads, limit access to metadata, and collect logs. Most orchestration managers are equipped with special tools that allow developers to share and store secret data like API and SSL certificates, encryption keys, identity tokens, and passwords more securely.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">8. Automated Security Testing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Integrating an efficient automated security test to the system will help you discover issues right on time and take actions accordingly. There are multiple tests available in the market which provides dynamic and static application security testing. Scanners like JFog Xray and Black Duck Hub benefit with realtime test monitoring. Such tools automatically test containers throughout the build or CI processes to ensure maximum assurance.\u00a0<\/span><\/p>\n<p><b>Reference Articles:<\/b><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">NIST Special Publication 800-180, NIST Definition of Microservices, Application Containers and System Virtual Machines<\/span><\/li>\n<li><span style=\"font-weight: 400;\">NIST Special Publication 800-190, Application Container Security Guide<\/span><\/li>\n<li><span style=\"font-weight: 400;\">NISTIR 8176, Security Assurance Requirements for Linux Application Container Deployments<\/span><\/li>\n<li><span style=\"font-weight: 400;\">DWP Security Policies and Standards, Security Standard &#8211; Microservices Architecture (SS-028)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1151\" class=\"pvc_stats all  \" data-element-id=\"1151\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Swift deployment and increased independence of services have made microservices which is made popular amongst the developers, convenient and approachable for organizations.\u00a0 However, transferring from a monolithic architecture to a microservices architecture fosters many issues, among which security affairs are the most significant ones to consider. Microservice architecture based applications accommodate thousands of containers, significantly [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1151\" class=\"pvc_stats all  \" data-element-id=\"1151\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[12,2],"tags":[424,423,255,417,427,422,425,420,421,426,428,419,418],"class_list":["post-1151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","category-managed-services","tag-micro-services","tag-microservice-architecture","tag-microservices","tag-microservices-architecture","tag-microservices-benefits","tag-microservices-design-pattern","tag-microservices-docker","tag-microservices-example","tag-microservices-explained","tag-microservices-jenkins","tag-microservices-pros-cons","tag-microservices-training","tag-what-are-microservices"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Best Practices For Securing Microservices And Containers - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Best Practices For Securing Microservices And Containers - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T18:42:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-29T17:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"8 Best Practices For Securing Microservices And Containers\",\"datePublished\":\"2019-09-10T18:42:45+00:00\",\"dateModified\":\"2021-09-29T17:13:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png\",\"keywords\":[\"micro-services\",\"microservice architecture\",\"microservices\",\"microservices architecture\",\"microservices benefits\",\"microservices design pattern\",\"microservices docker\",\"microservices example\",\"microservices explained\",\"microservices jenkins\",\"microservices pros cons\",\"microservices training\",\"what are microservices\"],\"articleSection\":[\"DevOps\",\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\",\"name\":\"8 Best Practices For Securing Microservices And Containers - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png\",\"datePublished\":\"2019-09-10T18:42:45+00:00\",\"dateModified\":\"2021-09-29T17:13:43+00:00\",\"description\":\"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png\",\"width\":768,\"height\":432,\"caption\":\"microservices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Best Practices For Securing Microservices And Containers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Best Practices For Securing Microservices And Containers - Urolime Blogs","description":"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/","og_locale":"en_US","og_type":"article","og_title":"8 Best Practices For Securing Microservices And Containers - Urolime Blogs","og_description":"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.","og_url":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/","og_site_name":"Urolime Blogs","article_published_time":"2019-09-10T18:42:45+00:00","article_modified_time":"2021-09-29T17:13:43+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"8 Best Practices For Securing Microservices And Containers","datePublished":"2019-09-10T18:42:45+00:00","dateModified":"2021-09-29T17:13:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png","keywords":["micro-services","microservice architecture","microservices","microservices architecture","microservices benefits","microservices design pattern","microservices docker","microservices example","microservices explained","microservices jenkins","microservices pros cons","microservices training","what are microservices"],"articleSection":["DevOps","Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/","url":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/","name":"8 Best Practices For Securing Microservices And Containers - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png","datePublished":"2019-09-10T18:42:45+00:00","dateModified":"2021-09-29T17:13:43+00:00","description":"Microservice architecture based applications accommodate thousands of containers, significantly expanding the attack facade.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2019\/09\/microservices.png","width":768,"height":432,"caption":"microservices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/8-best-practices-for-securing-microservices-and-containers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"8 Best Practices For Securing Microservices And Containers"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/1151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=1151"}],"version-history":[{"count":3,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/1151\/revisions"}],"predecessor-version":[{"id":2557,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/1151\/revisions\/2557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media\/1152"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=1151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=1151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=1151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}