TOP 10
MICRO- SEGMENTATION
Once it ’ s in , an attack normally finds it relatively simple work to spread sideways across systems . Leveraging microsegmentation to lock down system elements within a virtual data centre helps to limit the damage any breach might be able to cause . These days it can be deployed against most communication with the data centre .
6 5
CONTAINER SECURITY
An attack which exposes an OS vulnerability could easily compromise all containers , despite they themselves not being inherently insecure . Containers deployed in an insecure manner , without security-team oversight , are a risk and should be mitigated with container security solutions to protect them from creation into production . Most container security solutions will scan code from the outset and monitor them in use .
28 August 2017