INFORMATION SECURITY PORTAL

GUIDELINES -

CLOUD SERVICES

Below is useful information regarding the use of Cloud services. The information is based on how I would handle the inevitable move to the cloud from a “local” Datacentre.

Based on some of the studies and guidelines regarding Cloud services for Swedish governments, the move to Cloud services need to be gradually. Today it is not recommended for Swedish governments to use Cloud services own by US companies. But you want to be prepared for the move and develop applications that can be moved.

Docker is a set of platform as a service (PaaS) products that uses OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. All containers are run by a single operating system kernel and therefore use fewer resources than virtual machines.

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available.

Docker’s container-based platform allows for highly portable workloads. Docker containers can run on a developer’s local laptop, on physical or virtual machines in a data center, on cloud providers, or in a mixture of environments.


Docker’s portability and lightweight nature also make it easy to dynamically manage workloads, scaling up or tearing down applications and services as business needs dictate, in near real time.

Docker containers are the most popular containerisation technology. Used properly can increase level of security (in comparison to running application directly on the host). On the other hand some misconfigurations can lead to downgrade level of security or even introduce new vulnerabilities.


The aim of this information is to provide an easy to use list of common security mistakes and good practices that will help you securing your Docker containers.

This publication has been developed by NIST in order to provide information security standards and guidelines for federal information systems.

Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging. Containers provide a portable, reusable, and automatable way to package and run applications. This publication explains the potential security concerns associated with the use of containers and provides recommendations for addressing these concerns.

Copyright © 2019-2020 InformationSecurityPortal.se - All Rights Reserved