done. going to bed now.

This commit is contained in:
2024-01-21 05:54:27 +02:00
parent ce16d63eb5
commit 7acaffd8b5
4 changed files with 139 additions and 138 deletions

View File

@@ -20,10 +20,10 @@ of container technologies such as Docker, has in turn begun to drive the
adoption of the microservices architecture for application development. An
architecture based on virtualization technologies for hosting applications in
cloud infrastructures and container technologies for partitioning their
functions and thus, providing an appropriate level of performance and
scalability \footfullcite{awsMicroservices}. However, the applications in
question remain vulnerable to security issues that may be tied to the cloud
and/or the technologies on which it is based on.
functions into a set of containers and thus, providing an appropriate level of
performance and scalability \footfullcite{awsMicroservices}. However, the
applications in question remain vulnerable to security issues that may be tied
to the cloud and/or the technologies on which it is based on.
}
@@ -38,10 +38,10 @@ manner. However, the purpose of this paper goes beyond that and moves to a more
practical level by proposing the solution of a tool that can implement the
proposed safe use of these technologies. In particular, this tool can not only
create virtual machines across multiple cloud providers but also harden them in
an automated manner. In addition, it is capable of installing the Docker
container engine on these virtual machines, which it can also harden. The main
goal of this work is to make it easier for an organization to install and
configure in an automated manner a secure, distributed environment for the
an automated manner. In addition to that, it is capable of installing the
Docker container engine on these virtual machines, which it can also harden.
The main goal of this work is to make it easier for an organization to install
and configure in an automated manner a secure, distributed environment for the
deployment and operation of a microservices application. This automation lies
in the correct configuration of the tool, which does not require any special
knowledge on technical or security issues in regard to infrastructure and