Cloud Security with Docker and Kubernetes

Gorde:
Xehetasun bibliografikoak
Argitaratua izan da:PQDT - Global (2025)
Egile nagusia: Raftopoulos, Christos
Argitaratua:
ProQuest Dissertations & Theses
Gaiak:
Sarrera elektronikoa:Citation/Abstract
Full Text - PDF
Full text outside of ProQuest
Etiketak: Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!

MARC

LEADER 00000nab a2200000uu 4500
001 3223576269
003 UK-CbPIL
020 |a 9798311956970 
035 |a 3223576269 
045 2 |b d20250101  |b d20251231 
084 |a 189128  |2 nlm 
100 1 |a Raftopoulos, Christos 
245 1 |a Cloud Security with Docker and Kubernetes 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a The rapid adoption of containerization and cloud-native technologies has revolutionized modern IT infrastructure, enabling scalable and efficient application deployment. However, these advancements introduce new security challenges that must be addressed to protect sensitive data and maintain system integrity. This thesis provides a comprehensive examination of security considerations in cloud computing, virtualization, containerization, and orchestration platforms. It begins by exploring the security landscape of cloud computing and virtualization, highlighting the risks and benefits of hypervisor-based and container-based deployments. The research then delves into Docker security, analyzing architectural vulnerabilities, common misconfigurations, and best practices for securing containerized workloads.This thesis focuses also on Kubernetes security, detailing authentication mechanisms, network security policies, and secrets management to mitigate risks in orchestrated environments. It further explores common misconfiguration scenarios that expose containerized applications to potential attacks. The study also examines both static and dynamic security analysis techniques, demonstrating how security tools can be integrated to enhance proactive threat detection. Additionally, case studies of realworld security incidents illustrate the impact of misconfigurations and the importance of implementing robust security measures.Finally, this thesis presents best practices for hardening Docker and Kubernetes environments, including enforcing strict access controls, securing API communications, and applying network segmentation. The research emphasizes the necessity of a defense-in-depth approach, combining runtime monitoring, automated compliance enforcement, and continuous security assessments. By leveraging industry standards and security frameworks, this work provides practical guidance for securing containerized applications in cloud environments. 
653 |a Operating systems 
653 |a Best practice 
653 |a Computer centers 
653 |a Data integrity 
653 |a Internet 
653 |a User needs 
653 |a Disaster recovery 
653 |a Network security 
653 |a Computer peripherals 
653 |a Containerization 
653 |a Startups 
653 |a Empowerment 
653 |a Software services 
653 |a Fines & penalties 
653 |a Customer relationship management 
653 |a Data encryption 
653 |a Compliance 
653 |a Enterprise resource planning 
653 |a Cost control 
653 |a Cloud computing 
653 |a Access control 
653 |a Computer science 
653 |a Information technology 
773 0 |t PQDT - Global  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3223576269/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3223576269/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full text outside of ProQuest  |u https://dione.lib.unipi.gr/xmlui/handle/unipi/17520