{"id":9799,"date":"2023-11-15T13:10:50","date_gmt":"2023-11-15T13:10:50","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=9799"},"modified":"2023-11-15T13:10:50","modified_gmt":"2023-11-15T13:10:50","slug":"a-layered-approach-to-container-and-kubernetes-security","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/","title":{"rendered":"A layered approach to container and Kubernetes security"},"content":{"rendered":"<p>With many organizations now running essential services on containers, implementing container security has never been more critical. Read the whitepaper for insight on the key elements of security for containerized applications managed with Kubernetes. Contact us for flexible pricing and implementation details.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bcqmb2\" target=\"_blank\" rel=\"noopener\">View: A layered approach to container and Kubernetes security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking for comprehensive container and Kubernetes security? Check out Red Hat&#8217;s layered approach.  <\/p>\n<p>#Kubernetes #OpenShift<\/p>\n","protected":false},"author":2,"featured_media":9798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-9799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A layered approach to container and Kubernetes security - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A layered approach to container and Kubernetes security - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Looking for comprehensive container and Kubernetes security? Check out Red Hat&#039;s layered approach.  #Kubernetes #OpenShift\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-15T13:10:50+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"A layered approach to container and Kubernetes security\",\"datePublished\":\"2023-11-15T13:10:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\"},\"wordCount\":59,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\",\"name\":\"A layered approach to container and Kubernetes security - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg\",\"datePublished\":\"2023-11-15T13:10:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg\",\"width\":600,\"height\":776},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A layered approach to container and Kubernetes security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A layered approach to container and Kubernetes security - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/","og_locale":"en_US","og_type":"article","og_title":"A layered approach to container and Kubernetes security - TechTonic Times","og_description":"Looking for comprehensive container and Kubernetes security? Check out Red Hat's layered approach.  #Kubernetes #OpenShift","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/","og_site_name":"TechTonic Times","article_published_time":"2023-11-15T13:10:50+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"A layered approach to container and Kubernetes security","datePublished":"2023-11-15T13:10:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/"},"wordCount":59,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/","name":"A layered approach to container and Kubernetes security - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg","datePublished":"2023-11-15T13:10:50+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/11\/A_layered_approach_to_container_and_Kubernetes_security_thumb.jpg","width":600,"height":776},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-layered-approach-to-container-and-kubernetes-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A layered approach to container and Kubernetes security"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=9799"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9799\/revisions"}],"predecessor-version":[{"id":9800,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9799\/revisions\/9800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/9798"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=9799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=9799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=9799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}